default search action
Siu-Ming Yiu
Person information
- affiliation: University of Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j152]Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu:
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH. IACR Commun. Cryptol. 1(3): 48 (2024) - [j151]Yiqi Deng, Yuzhi Liang, Siu-Ming Yiu:
Towards interpretable stock trend prediction through causal inference. Expert Syst. Appl. 238(Part B): 121654 (2024) - [j150]Junbin Fang, You Jiang, Canjian Jiang, Zoe Lin Jiang, Chuanyi Liu, Siu-Ming Yiu:
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems. Expert Syst. Appl. 250: 123761 (2024) - [j149]Shijie Na, Yuzhi Liang, Siu-Ming Yiu:
A federated learning incentive mechanism in a non-monopoly market. Neurocomputing 586: 127630 (2024) - [j148]Qianheng Yang, Yuer Yang, Shiyuan Xu, Rongrong Guo, Huiguang Xian, Yifeng Lin, Xue Chen, Wuzheng Tan, Siu-Ming Yiu:
PPCT: Privacy-Preserving Contact Tracing Using Concise Private Set Intersection Cardinality. J. Netw. Syst. Manag. 32(4): 97 (2024) - [j147]Xiao Tan, Siu Ming Yiu:
Self-Adaptive Incremental PCA-Based DBSCAN of Acoustic Features for Anomalous Sound Detection. SN Comput. Sci. 5(5): 542 (2024) - [j146]Xue Chen, Shiyuan Xu, Shang Gao, Yu Guo, Siu-Ming Yiu, Bin Xiao:
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records. IEEE Trans. Inf. Forensics Secur. 19: 8875-8891 (2024) - [c259]Xingwei He, Qianru Zhang, A-Long Jin, Jun Ma, Yuan Yuan, Siu Ming Yiu:
Improving Factual Error Correction by Learning to Inject Factual Errors. AAAI 2024: 18197-18205 - [c258]Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu:
zkMatrix: Batched Short Proof for Committed Matrix Multiplication. AsiaCCS 2024 - [c257]Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. CCS 2024: 899-913 - [c256]Shiyuan Xu, Yibo Cao, Xue Chen, Yu Guo, Yuer Yang, Fangda Guo, Siu-Ming Yiu:
Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management. CIKM 2024: 2702-2711 - [c255]Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu-Ming Yiu, Xuan Wang:
FSSiBNN: FSS-Based Secure Binarized Neural Network Inference with Free Bitwidth Conversion. ESORICS (1) 2024: 229-250 - [c254]Qianru Zhang, Lianghao Xia, Xuheng Cai, Siu-Ming Yiu, Chao Huang, Christian S. Jensen:
Graph Augmentation for Recommendation. ICDE 2024: 557-569 - [c253]Xingwei He, Zhenghao Lin, Yeyun Gong, A-Long Jin, Hang Zhang, Chen Lin, Jian Jiao, Siu Ming Yiu, Nan Duan, Weizhu Chen:
AnnoLLM: Making Large Language Models to Be Better Crowdsourced Annotators. NAACL (Industry Track) 2024: 165-190 - [c252]Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. Public Key Cryptography (2) 2024: 3-35 - [c251]Ke Zhang, Lichao Sun, Bolin Ding, Siu Ming Yiu, Carl Yang:
Deep Efficient Private Neighbor Generation for Subgraph Federated Learning. SDM 2024: 806-814 - [c250]Tengjiao Zheng, Li Ning, Yanming Zhao, Siu Ming Yiu:
Application with Digital Currencies Trading Using Machine Learning. WASA (1) 2024: 247-260 - [i69]Ke Zhang, Lichao Sun, Bolin Ding, Siu Ming Yiu, Carl Yang:
Deep Efficient Private Neighbor Generation for Subgraph Federated Learning. CoRR abs/2401.04336 (2024) - [i68]Yujing Sun, Caiyi Sun, Yuan Liu, Yuexin Ma, Siu Ming Yiu:
Extreme Two-View Geometry From Object Poses with Diffusion Models. CoRR abs/2402.02800 (2024) - [i67]Chi Zhang, Man Ho Au, Siu Ming Yiu:
Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement. CoRR abs/2402.11224 (2024) - [i66]Qianru Zhang, Lianghao Xia, Xuheng Cai, Siu-Ming Yiu, Chao Huang, Christian S. Jensen:
Graph Augmentation for Recommendation. CoRR abs/2403.16656 (2024) - [i65]Shijie Na, Yuzhi Liang, Siu-Ming Yiu:
GPFL: A Gradient Projection-Based Client Selection Framework for Efficient Federated Learning. CoRR abs/2403.17833 (2024) - [i64]Qianru Zhang, Haixin Wang, Cheng Long, Liangcai Su, Xingwei He, Jianlong Chang, Tailin Wu, Hongzhi Yin, Siu-Ming Yiu, Qi Tian, Christian S. Jensen:
A Survey of Generative Techniques for Spatial-Temporal Data Mining. CoRR abs/2405.09592 (2024) - [i63]Yiqi Deng, Xingwei He, Jiahao Hu, Siu-Ming Yiu:
Enhancing Few-Shot Stock Trend Prediction with Large Language Models. CoRR abs/2407.09003 (2024) - [i62]Qianru Zhang, Zheng Wang, Cheng Long, Siu-Ming Yiu:
Billiards Sports Analytics: Datasets and Tasks. CoRR abs/2407.19686 (2024) - [i61]Qianru Zhang, Peng Yang, Junliang Yu, Haixin Wang, Xingwei He, Siu-Ming Yiu, Hongzhi Yin:
A Survey on Point-of-Interest Recommendation: Models, Architectures, and Security. CoRR abs/2410.02191 (2024) - [i60]Xingwei He, Qianru Zhang, A-Long Jin, Yuan Yuan, Siu-Ming Yiu:
TUBench: Benchmarking Large Vision-Language Models on Trustworthiness with Unanswerable Questions. CoRR abs/2410.04107 (2024) - [i59]Qianru Zhang, Haixin Wang, Siu-Ming Yiu, Hongzhi Yin:
Graph Masked Autoencoder for Spatio-Temporal Graph Learning. CoRR abs/2410.10915 (2024) - [i58]Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. IACR Cryptol. ePrint Arch. 2024: 27 (2024) - [i57]Mingshu Cong, Tsz Hon Yuen, Siu Ming Yiu:
zkMatrix: Batched Short Proof for Committed Matrix Multiplication. IACR Cryptol. ePrint Arch. 2024: 161 (2024) - [i56]Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie:
Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2024: 617 (2024) - [i55]Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu:
Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage. IACR Cryptol. ePrint Arch. 2024: 761 (2024) - [i54]Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, Bin Xiao:
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things. IACR Cryptol. ePrint Arch. 2024: 965 (2024) - [i53]Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, Xuan Wang:
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion. IACR Cryptol. ePrint Arch. 2024: 1010 (2024) - [i52]Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Siu-Ming Yiu:
RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage. IACR Cryptol. ePrint Arch. 2024: 1302 (2024) - [i51]Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. IACR Cryptol. ePrint Arch. 2024: 1355 (2024) - 2023
- [j145]Gongxian Zeng, Meiqi He, Siu-Ming Yiu, Zhengan Huang:
Corrigendum to: A Self-Tallying Electronic Voting Based on Blockchain. Comput. J. 66(2): 523 (2023) - [j144]Yanan Gong, Kam-Pui Chow, Siu Ming Yiu, Hing-Fung Ting:
Analyzing the peeling chain patterns on the Bitcoin blockchain. Forensic Sci. Int. Digit. Investig. 46(Supplement): 301614 (2023) - [j143]Cailing Cai, Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu:
Practical fully leakage resilient signatures with auxiliary inputs. Future Gener. Comput. Syst. 141: 448-461 (2023) - [j142]Eric Ke Wang, Zicong Chen, Xilin Dang, Xuan Fan, Xuming Han, Chien-Ming Chen, Weiping Ding, Siu-Ming Yiu, Jian Weng:
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation. Pattern Recognit. 143: 109745 (2023) - [j141]Yujing Sun, Hao Xiong, Siu Ming Yiu, Kwok-Yan Lam:
BitAnalysis: A Visualization System for Bitcoin Wallet Investigation. IEEE Trans. Big Data 9(2): 621-636 (2023) - [j140]Zhiwei Wang, Feng Liu, Siu-Ming Yiu, Longwen Lan:
Online/Offline and History Indexing Identity-Based Fuzzy Message Detection. IEEE Trans. Inf. Forensics Secur. 18: 5553-5566 (2023) - [j139]Eric Ke Wang, Zicong Chen, Mingjia Zhu, Siu-Ming Yiu, Chien-Ming Chen, Mohammad Mehedi Hassan, Stefano Izzo, Giancarlo Fortino:
Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain. IEEE Trans. Ind. Informatics 19(2): 2165-2172 (2023) - [j138]Zhiwei Wang, Longwen Lan, Siu-Ming Yiu:
Chameleon Hash Based Efficiently Updatable Oblivious Key Management. IEEE Trans. Serv. Comput. 16(6): 4503-4513 (2023) - [c249]Tik Yu Yim, Yuxuan Zhang, Wenting Tan, Tak Wah Lam, Siu Ming Yiu:
Meticulously Analyzing ESG Disclosure: A Data-Driven Approach. IEEE Big Data 2023: 2884-2889 - [c248]Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, Siu-Ming Yiu:
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications. Inscrypt (1) 2023: 274-298 - [c247]Xingwei He, A-Long Jin, Jun Ma, Yuan Yuan, Siu Ming Yiu:
PivotFEC: Enhancing Few-shot Factual Error Correction with a Pivot Task Approach using Large Language Models. EMNLP (Findings) 2023: 9960-9976 - [c246]Xingwei He, Yeyun Gong, A-Long Jin, Hang Zhang, Anlei Dong, Jian Jiao, Siu-Ming Yiu, Nan Duan:
CAPSTONE: Curriculum Sampling for Dense Retrieval with Document Expansion. EMNLP 2023: 10531-10541 - [c245]Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions and Constructions. EUROCRYPT (5) 2023: 67-97 - [c244]Qianru Zhang, Zheng Wang, Cheng Long, Chao Huang, Siu-Ming Yiu, Yiding Liu, Gao Cong, Jieming Shi:
Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning. ICDE 2023: 246-258 - [c243]Cheuk Yu Ip, Fu Kay Frankie Li, Yi Anson Lam, Siu Ming Yiu:
Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model. ICDF2C (1) 2023: 78-95 - [c242]Qianru Zhang, Chao Huang, Lianghao Xia, Zheng Wang, Siu Ming Yiu, Ruihua Han:
Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation. ICML 2023: 41151-41163 - [c241]Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu, Peng Yang, Man Chen, Zejiu Tan, Bohan Jin:
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE. MobiSec 2023: 94-108 - [c240]Junbin Fang, Zewei Yang, Siyuan Dai, You Jiang, Canjian Jiang, Zoe Lin Jiang, Chuanyi Liu, Siu-Ming Yiu:
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation. PRCV (3) 2023: 478-491 - [c239]Bing-Xue Du, Yi Xu, Siu-Ming Yiu, Hui Yu, Jian-Yu Shi:
MTGL-ADMET: A Novel Multi-task Graph Learning Framework for ADMET Prediction Enhanced by Status-Theory and Maximum Flow. RECOMB 2023: 85-103 - [c238]Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang:
Privacy-Preserving Distributed Machine Learning Made Faster. SecTL@AsiaCCS 2023: 2:1-2:14 - [c237]Tsz Ho Pun, Yi Jun He, Siu Ming Yiu:
Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption. UbiSec 2023: 274-288 - [c236]Qianru Zhang, Chao Huang, Lianghao Xia, Zheng Wang, Zhonghang Li, Siu-Ming Yiu:
Automated Spatio-Temporal Graph Contrastive Learning. WWW 2023: 295-305 - [i50]Junbin Fang, You Jiang, Canjian Jiang, Zoe Lin Jiang, Siu-Ming Yiu, Chuanyi Liu:
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems. CoRR abs/2303.12249 (2023) - [i49]Xingwei He, Zhenghao Lin, Yeyun Gong, A-Long Jin, Hang Zhang, Chen Lin, Jian Jiao, Siu Ming Yiu, Nan Duan, Weizhu Chen:
AnnoLLM: Making Large Language Models to Be Better Crowdsourced Annotators. CoRR abs/2303.16854 (2023) - [i48]Qianru Zhang, Chao Huang, Lianghao Xia, Zheng Wang, Zhonghang Li, Siu-Ming Yiu:
Automated Spatio-Temporal Graph Contrastive Learning. CoRR abs/2305.03920 (2023) - [i47]Qianru Zhang, Chao Huang, Lianghao Xia, Zheng Wang, Siu-Ming Yiu, Ruihua Han:
Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation. CoRR abs/2306.10683 (2023) - [i46]Junbin Fang, Canjian Jiang, You Jiang, Puxi Lin, Zhaojie Chen, Yujing Sun, Siu-Ming Yiu, Zoe Lin Jiang:
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation. CoRR abs/2307.13294 (2023) - [i45]Xingwei He, Qianru Zhang, A-Long Jin, Jun Ma, Yuan Yuan, Siu Ming Yiu:
Improving Factual Error Correction by Learning to Inject Factual Errors. CoRR abs/2312.07049 (2023) - [i44]Peng Yang, Zoe Lin Jiang, Shiqi Gao, Jiehang Zhuang, Hongxiao Wang, Junbin Fang, Siu-Ming Yiu, Yulin Wu:
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing. IACR Cryptol. ePrint Arch. 2023: 73 (2023) - [i43]Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions & Constructions. IACR Cryptol. ePrint Arch. 2023: 332 (2023) - [i42]Shiyuan Xu, Yibo Cao, Xue Chen, Siu-Ming Yiu, Yanmin Zhao:
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications. IACR Cryptol. ePrint Arch. 2023: 591 (2023) - [i41]Shiyuan Xu, Yibo Cao, Xue Chen, Yuer Yang, Siu-Ming Yiu:
Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications. IACR Cryptol. ePrint Arch. 2023: 1715 (2023) - 2022
- [j137]Gongxian Zeng, Meiqi He, Siu-Ming Yiu, Zhengan Huang:
A Self-Tallying Electronic Voting Based on Blockchain. Comput. J. 65(12): 3020-3034 (2022) - [j136]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Siu-Ming Yiu, Hao Wang:
Generic server-aided secure multi-party computation in cloud computing. Comput. Stand. Interfaces 79: 103552 (2022) - [j135]Yanan Gong, Kam-Pui Chow, Siu-Ming Yiu, Hing-Fung Ting:
Sensitivity analysis for a Bitcoin simulation model. Digit. Investig. 43(Supplement): 301449 (2022) - [j134]Anthony Cheuk Tung Lai, Ping Fan Ke, Kelvin Chan, Siu Ming Yiu, Dongsun Kim, Wai Kin Wong, Shuai Wang, Joseph Muppala, Alan Ho:
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks. J. Internet Serv. Inf. Secur. 12(3): 63-75 (2022) - [c235]Xingwei He, Siu-Ming Yiu:
Controllable Dictionary Example Generation: Generating Example Sentences for Specific Targeted Audiences. ACL (1) 2022: 610-627 - [c234]Cailing Cai, Xianrui Qin, Tsz Hon Yuen, Siu-Ming Yiu:
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting. AsiaCCS 2022: 42-53 - [c233]Xingwei He, Yeyun Gong, A-Long Jin, Weizhen Qi, Hang Zhang, Jian Jiao, Bartuer Zhou, Biao Cheng, Siu-Ming Yiu, Nan Duan:
Metric-guided Distillation: Distilling Knowledge from the Metric to Ranker and Retriever for Generative Commonsense Reasoning. EMNLP 2022: 839-852 - [c232]Yi Liu, Qi Wang, Siu-Ming Yiu:
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability. ESORICS (1) 2022: 424-443 - [c231]Zoe Lin Jiang, Yijian Pan, Maoshun Fan, Lin Yao, Yang Liu, Yulin Wu, Siu-Ming Yiu, Xuan Wang, Junbin Fang:
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature. ICDIS 2022: 134-141 - [c230]Yanan Gong, Kam-Pui Chow, Hing-Fung Ting, Siu-Ming Yiu:
Analyzing the Error Rates of Bitcoin Clustering Heuristics. IFIP Int. Conf. Digital Forensics 2022: 187-205 - [c229]Yi Liu, Qi Wang, Siu-Ming Yiu:
Making Private Function Evaluation Safer, Faster, and Simpler. Public Key Cryptography (1) 2022: 349-378 - [c228]Qianru Zhang, Zheng Wang, Cheng Long, Siu-Ming Yiu:
On Predicting and Generating a Good Break Shot in Billiards Sports. SDM 2022: 109-117 - [c227]Yanmin Zhao, Yang Wang, Siu Ming Yiu, Yu Liu, Meiqin Wang:
A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions. STM 2022: 24-51 - [c226]Cailing Cai, Tsz Hon Yuen, Siu-Ming Yiu:
Hash Proof System with Auxiliary Inputs and Its Application. TrustCom 2022: 52-59 - [c225]Yixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang, Zoe Lin Jiang, Siu-Ming Yiu:
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle. TrustCom 2022: 1020-1027 - [i40]Zoe Lin Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang:
Privacy-Preserving Distributed Machine Learning Made Faster. CoRR abs/2205.05825 (2022) - [i39]Yiqi Deng, Siu Ming Yiu:
Deep Multiple Instance Learning For Forecasting Stock Trends Using Financial News. CoRR abs/2206.14452 (2022) - [i38]Xingwei He, Yeyun Gong, A-Long Jin, Weizhen Qi, Hang Zhang, Jian Jiao, Bartuer Zhou, Biao Cheng, Siu-Ming Yiu, Nan Duan:
Metric-guided Distillation: Distilling Knowledge from the Metric to Ranker and Retriever for Generative Commonsense Reasoning. CoRR abs/2210.11708 (2022) - [i37]Qianru Zhang, Zheng Wang, Cheng Long, Chao Huang, Siu-Ming Yiu, Yiding Liu, Gao Cong, Jieming Shi:
Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning. CoRR abs/2211.08415 (2022) - [i36]Hongxiao Wang, Zoe Lin Jiang, Yanmin Zhao, Siu-Ming Yiu, Peng Yang, Zejiu Tan, Bohan Jin, Shiyuan Xu, Shimin Pan:
Securer and Faster Privacy-Preserving Distributed Machine Learning. CoRR abs/2211.09353 (2022) - [i35]Xingwei He, Yeyun Gong, A-Long Jin, Hang Zhang, Anlei Dong, Jian Jiao, Siu-Ming Yiu, Nan Duan:
Curriculum Sampling for Dense Retrieval with Document Expansion. CoRR abs/2212.09114 (2022) - [i34]Yi Liu, Qi Wang, Siu-Ming Yiu:
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability. IACR Cryptol. ePrint Arch. 2022: 585 (2022) - 2021
- [j133]En Zhang, Ming Li, Siu-Ming Yiu, Jiao Du, Jun-Zhe Zhu, Ganggang Jin:
Fair hierarchical secret sharing scheme based on smart contract. Inf. Sci. 546: 166-176 (2021) - [j132]Jun Zhang, Zoe Lin Jiang, Ping Li, Siu-Ming Yiu:
Privacy-preserving multikey computing framework for encrypted data in the cloud. Inf. Sci. 575: 217-230 (2021) - [j131]Wenbin Chen, Jin Li, Zhengan Huang, Chongzhi Gao, Siu-Ming Yiu, Zoe Lin Jiang:
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key. J. Comput. Syst. Sci. 120: 137-148 (2021) - [j130]Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu:
Editorial: Security and Privacy in Computing and Communications. Mob. Networks Appl. 26(4): 1407-1411 (2021) - [j129]Xiaojie Guo, Yanyu Huang, Jinhui Ye, Sijie Yin, Min Li, Zhaohui Li, Siu-Ming Yiu, Xiaochun Cheng:
ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM. Mob. Networks Appl. 26(4): 1733-1746 (2021) - [j128]Xiao-Ying Yan, Shaowu Zhang, Siu-Ming Yiu, Jian-Yu Shi:
Interpretable prediction of drug-cell line response by triple matrix factorization. Quant. Biol. 9(4): 426-439 (2021) - [j127]Yaoling Ding, Liehuang Zhu, An Wang, Yuan Li, Yongjuan Wang, Siu Ming Yiu, Keke Gai:
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 71:1-71:21 (2021) - [j126]Yujing Sun, Hao Xiong, Siu-Ming Yiu:
Understanding deep face anti-spoofing: from the perspective of data. Vis. Comput. 37(5): 1015-1028 (2021) - [j125]Chang Liu, Gang Xiong, Gaopeng Gou, Siu-Ming Yiu, Zhen Li, Zhihong Tian:
Classifying encrypted traffic using adaptive fingerprints with multi-level attributes. World Wide Web 24(6): 2071-2097 (2021) - [c224]Yanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu, Siu-Ming Yiu, Meiqin Wang:
Forced Independent Optimized Implementation of 4-Bit S-Box. ACISP 2021: 151-170 - [c223]Yi Liu, Qi Wang, Siu-Ming Yiu:
Blind Polynomial Evaluation and Data Trading. ACNS (1) 2021: 100-129 - [c222]Yi Liu, Qi Wang, Siu-Ming Yiu:
Improved Zero-Knowledge Argument of Encrypted Extended Permutation. Inscrypt 2021: 281-298 - [c221]Jing Wen, Siu-Ming Yiu, Lucas C. K. Hui:
Defending Against Model Inversion Attack by Adversarial Examples. CSR 2021: 551-556 - [c220]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
Detecting Anomalous Programmable Logic Controller Events Using Process Mining. Critical Infrastructure Protection 2021: 119-133 - [c219]Ke Zhang, Carl Yang, Xiaoxiao Li, Lichao Sun, Siu-Ming Yiu:
Subgraph Federated Learning with Missing Neighbor Generation. NeurIPS 2021: 6671-6682 - [c218]Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. SAC 2021: 223-245 - [i33]Ke Zhang, Carl Yang, Xiaoxiao Li, Lichao Sun, Siu-Ming Yiu:
Subgraph Federated Learning with Missing Neighbor Generation. CoRR abs/2106.13430 (2021) - [i32]Yi Liu, Qi Wang, Siu-Ming Yiu:
Blind Polynomial Evaluation and Data Trading. IACR Cryptol. ePrint Arch. 2021: 413 (2021) - [i31]Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. IACR Cryptol. ePrint Arch. 2021: 1310 (2021) - [i30]Yi Liu, Qi Wang, Siu-Ming Yiu:
Improved Zero-Knowledge Argument of Encrypted Extended Permutation. IACR Cryptol. ePrint Arch. 2021: 1430 (2021) - [i29]Yi Liu, Qi Wang, Siu-Ming Yiu:
Making Private Function Evaluation Safer, Faster, and Simpler. IACR Cryptol. ePrint Arch. 2021: 1682 (2021) - 2020
- [j124]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j123]Junbin Fang, Guikai Xi, Rong Li, Qian Chen, Puxi Lin, Sijin Li, Zoe Lin Jiang, Siu-Ming Yiu:
Coarse-to-fine two-stage semantic video carving approach in digital forensics. Comput. Secur. 97: 101942 (2020) - [j122]Eric Ke Wang, Chien-Ming Chen, Siu-Ming Yiu, Mohammad Mehedi Hassan, Majed A. AlRubaian, Giancarlo Fortino:
Incentive evolutionary game model for opportunistic social networks. Future Gener. Comput. Syst. 102: 14-29 (2020) - [j121]Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Zechao Liu, Junbin Fang, Siu-Ming Yiu, Xuan Wang:
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. Inf. Sci. 518: 168-180 (2020) - [j120]Shing Ki Wong, Siu-Ming Yiu:
Identification of device motion status via Bluetooth discovery. J. Internet Serv. Inf. Secur. 10(4): 59-69 (2020) - [j119]Shing Ki Wong, Siu-Ming Yiu:
Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(4): 16-30 (2020) - [j118]Yanyu Huang, Bo Li, Zheli Liu, Jin Li, Siu-Ming Yiu, Thar Baker, Brij B. Gupta:
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. IEEE Trans. Serv. Comput. 13(4): 602-612 (2020) - [c217]Cailing Cai, Tsz Hon Yuen, Handong Cui, Mingli Wu, Siu-Ming Yiu:
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks. Inscrypt 2020: 288-303 - [c216]Yi Liu, Qi Wang, Siu-Ming Yiu:
An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster. Inscrypt 2020: 397-414 - [c215]Jun Zhang, Siu-Ming Yiu, Zoe Lin Jiang:
Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions. ICA3PP (2) 2020: 126-141 - [c214]Yuechen Chen, Linru Zhang, Siu-Ming Yiu:
Decentralized Multi-Client Attribute Based Functional Encryption. ICETE (2) 2020: 118-129 - [c213]Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model. ICICS 2020: 565-587 - [c212]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines. IFIP Int. Conf. Digital Forensics 2020: 95-108 - [c211]Yichen Wei, Kam-Pui Chow, Siu-Ming Yiu:
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning. IFIP Int. Conf. Digital Forensics 2020: 273-290 - [c210]Xin Wang, Siu-Ming Yiu:
Classification with Rejection: Scaling Generative Classifiers with Supervised Deep Infomax. IJCAI 2020: 2980-2986 - [c209]Ke Zhang, Siu-Ming Yiu, Lucas Chi Kwong Hui:
A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated Learning System. IJCNN 2020: 1-8 - [c208]Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:
Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-Resilience. INDOCRYPT 2020: 666-690 - [c207]Jun Zhang, Zoe Lin Jiang, Ping Li, Siu-Ming Yiu:
Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys. SmartCom 2020: 215-225 - [c206]Shing Ki Wong, Siu-Ming Yiu:
Detection on GPS Spoofing in Location Based Mobile Games. WISA 2020: 215-226 - [p3]Mingshu Cong, Han Yu, Xi Weng, Siu-Ming Yiu:
A Game-Theoretic Framework for Incentive Mechanism Design in Federated Learning. Federated Learning 2020: 205-222 - [i28]Tsong Yueh Chen, Shing-Chi Cheung, Siu-Ming Yiu:
Metamorphic Testing: A New Approach for Generating Next Test Cases. CoRR abs/2002.12543 (2020) - [i27]Mingshu Cong, Xi Weng, Han Yu, Jiabao Qu, Siu-Ming Yiu:
Optimal Procurement Auction for Cooperative Production of Virtual Products: Vickrey-Clarke-Groves Meet Cremer-McLean. CoRR abs/2007.14780 (2020) - [i26]Mingshu Cong, Han Yu, Xi Weng, Jiabao Qu, Yang Liu, Siu-Ming Yiu:
A VCG-based Fair Incentive Mechanism for Federated Learning. CoRR abs/2008.06680 (2020) - [i25]Yi Liu, Qi Wang, Siu-Ming Yiu:
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster. IACR Cryptol. ePrint Arch. 2020: 567 (2020) - [i24]Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model. IACR Cryptol. ePrint Arch. 2020: 884 (2020) - [i23]Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience. IACR Cryptol. ePrint Arch. 2020: 1353 (2020)
2010 – 2019
- 2019
- [j117]Ye Li, Zoe Lin Jiang, Lin Yao, Xuan Wang, Siu-Ming Yiu, Zhengan Huang:
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties. Clust. Comput. 22(Suppl 1): 1581-1593 (2019) - [j116]Jian-Yu Shi, Jia-Xin Li, Kui-Tao Mao, Jiang-Bo Cao, Peng Lei, Hui-Meng Lu, Siu-Ming Yiu:
Predicting combinative drug pairs via multiple classifier system with positive samples only. Comput. Methods Programs Biomed. 168: 1-10 (2019) - [j115]Xuan Li, Jin Li, Siu-Ming Yiu, Chongzhi Gao, Jinbo Xiong:
Privacy-preserving edge-assisted image retrieval and classification in IoT. Frontiers Comput. Sci. 13(5): 1136-1147 (2019) - [j114]Bo Li, Yanyu Huang, Zheli Liu, Jin Li, Zhihong Tian, Siu-Ming Yiu:
HybridORAM: Practical oblivious cloud storage with constant bandwidth. Inf. Sci. 479: 651-663 (2019) - [j113]Jian-Yu Shi, Kui-Tao Mao, Hui Yu, Siu-Ming Yiu:
Detecting drug communities and predicting comprehensive drug-drug interactions via balance regularized semi-nonnegative matrix factorization. J. Cheminformatics 11(1): 28:1-28:16 (2019) - [j112]Shing Ki Wong, Siu-Ming Yiu:
Detection on auto clickers in mobile games. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(3): 65-80 (2019) - [j111]Yuzhi Liang, Min Yang, Jia Zhu, Siu-Ming Yiu:
Out-domain Chinese new word detection with statistics-based character embedding. Nat. Lang. Eng. 25(2): 239-255 (2019) - [j110]Cheuk Yu Yeung, Lucas Chi Kwong Hui, Tat Wing Chim, Siu-Ming Yiu, Gongxian Zeng, Jingyue Chen:
Anonymous Counting Problem in Trust Level Warning System for VANET. IEEE Trans. Veh. Technol. 68(1): 34-48 (2019) - [c205]Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He, Siu-Ming Yiu:
From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions. C2SI 2019: 142-167 - [c204]Yujing Sun, Hao Xiong, Siu-Ming Yiu, Kwok-Yan Lam:
BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis. CVCBT 2019: 21-25 - [c203]Linru Zhang, Gongxian Zeng, Yuechen Chen, Nairen Cao, Siu-Ming Yiu, Zheli Liu:
OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm. ICETE (2) 2019: 149-160 - [c202]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
An Incident Response Model for Industrial Control System Forensics Based on Historical Events. Critical Infrastructure Protection 2019: 311-328 - [c201]Tsz Hon Yuen, Siu-Ming Yiu:
Strong Known Related-Key Attacks and the Security of ECDSA. NSS 2019: 130-145 - [c200]Gongxian Zeng, Meiqi He, Siu-Ming Yiu:
A Secure and Self-tallying E-voting System Based on Blockchain. WISA 2019: 67-76 - [i22]Yaoling Ding, An Wang, Siu-Ming Yiu:
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis. IACR Cryptol. ePrint Arch. 2019: 189 (2019) - [i21]Yuechen Chen, Linru Zhang, Siu-Ming Yiu:
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions. IACR Cryptol. ePrint Arch. 2019: 846 (2019) - 2018
- [j109]Jianyu Shi, Hua Huang, Yan-Ning Zhang, Jiang-Bo Cao, Siu-Ming Yiu:
BMCMDA: a novel model for predicting human microbe-disease associations via binary matrix completion. BMC Bioinform. 19-S(9): 169-176 (2018) - [j108]Jian-Yu Shi, Hua Huang, Jia-Xin Li, Peng Lei, Yan-Ning Zhang, Kai Dong, Siu-Ming Yiu:
TMFUF: a triple matrix factorization-based unified framework for predicting comprehensive drug-drug interactions of new drugs. BMC Bioinform. 19-S(14): 27-37 (2018) - [j107]Hui Yu, Kui-Tao Mao, Jian-Yu Shi, Hua Huang, Zhi Chen, Kai Dong, Siu-Ming Yiu:
Predicting and understanding comprehensive drug-drug interactions via semi-nonnegative matrix factorization. BMC Syst. Biol. 12(1): 101-110 (2018) - [j106]Xianyan Wu, Qi Han, Xiamu Niu, Hongli Zhang, Siu-Ming Yiu, Jun-bin Fang:
JPEG image width estimation for file carving. IET Image Process. 12(7): 1245-1252 (2018) - [j105]Ye Li, Xuan Wang, Zoe Lin Jiang, Siu-Ming Yiu:
Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties. Int. J. High Perform. Comput. Netw. 12(2): 207-215 (2018) - [j104]Kuang-Yu Chang, Yun Cui, Siu-Ming Yiu, Wing-Kai Hon:
Reconstructing One-Articulated Networks with Distance Matrices. J. Comput. Biol. 25(3): 253-269 (2018) - [j103]Jun Zhang, Meiqi He, Gongxian Zeng, Siu-Ming Yiu:
Privacy-preserving verifiable elastic net among multiple institutions in the cloud. J. Comput. Secur. 26(6): 791-815 (2018) - [j102]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu:
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J. Netw. Comput. Appl. 108: 112-123 (2018) - [j101]Eric Ke Wang, Yueping Li, Yunming Ye, Siu-Ming Yiu, Lucas C. K. Hui:
A Dynamic Trust Framework for Opportunistic Mobile Social Networks. IEEE Trans. Netw. Serv. Manag. 15(1): 319-329 (2018) - [c199]Jing Wen, Lucas C. K. Hui, Siu-Ming Yiu, Ruoqing Zhang:
DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks. DSN Workshops 2018: 215-221 - [c198]Yulin Wu, Xuan Wang, Zoe Lin Jiang, Xuan Li, Jin Li, Siu-Ming Yiu, Zechao Liu, Hainan Zhao, Chunkai Zhang:
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection. ICA3PP (4) 2018: 374-388 - [c197]Wenli Sun, Zoe Lin Jiang, Jun Zhang, Siu-Ming Yiu, Yulin Wu, Hainan Zhao, Xuan Wang, Peng Zhang:
Outsourced Privacy Preserving SVM with Multiple Keys. ICA3PP (4) 2018: 415-430 - [c196]Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, Siu-Ming Yiu, Junbin Fang:
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing. ICA3PP (4) 2018: 447-460 - [c195]Meiqi He, Gongxian Zeng, Jun Zhang, Linru Zhang, Yuechen Chen, Siu-Ming Yiu:
A New Privacy-Preserving Searching Model on Blockchain. ICISC 2018: 248-266 - [c194]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
A Forensic Logging System for Siemens Programmable Logic Controllers. IFIP Int. Conf. Digital Forensics 2018: 331-349 - [c193]Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau:
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers. IFIP Int. Conf. Digital Forensics 2018: 351-367 - [c192]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Yulin Wu, Siu-Ming Yiu:
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 1003-1008 - [c191]Chang Liu, Zigang Cao, Gang Xiong, Gaopeng Gou, Siu-Ming Yiu, Longtao He:
MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints. IWQoS 2018: 1-10 - [c190]Gongxian Zeng, Meiqi He, Linru Zhang, Jun Zhang, Yuechen Chen, Siu-Ming Yiu:
Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform. PST 2018: 1-10 - [c189]Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 140-147 - [c188]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Ruoqing Zhang, Yulin Wu:
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage. TrustCom/BigDataSE 2018: 614-623 - [e4]Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 [contents] - [i20]Ziliang Lai, Chris Liu, Eric Lo, Ben Kao, Siu-Ming Yiu:
Decentralized Search on Decentralized Web. CoRR abs/1809.00939 (2018) - 2017
- [j100]Bo Liu, Tao Jiang, Siu-Ming Yiu, Junyi Li, Yadong Wang:
rMFilter: acceleration of long read-based structure variation calling by chimeric read filtering. Bioinform. 33(17): 2750-2752 (2017) - [j99]Jian-Yu Shi, Jia-Xin Li, Ke Gao, Peng Lei, Siu-Ming Yiu:
Predicting combinative drug pairs towards realistic screening via integrating heterogeneous features. BMC Bioinform. 18(S-12): 409:1-409:9 (2017) - [j98]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Xinyi Huang, Siu-Ming Yiu, Kunihiko Sadakane:
Offline/online attribute-based encryption with verifiable outsourced decryption. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j97]Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming Yiu, Kai Chen:
Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74: 76-85 (2017) - [j96]Fei Xu, Pinxin Liu, Jing Xu, Jianfeng Yang, Siu-Ming Yiu:
Multi-Dimensional Bloom Filter: Design and Evaluation. IEICE Trans. Inf. Syst. 100-D(10): 2368-2372 (2017) - [j95]Haobin Yao, Tak Wah Lam, H. F. Ting, Siu-Ming Yiu, Yadong Wang, Bo Liu:
Accurate annotation of metagenomic data without species-level references. Int. J. Data Min. Bioinform. 19(4): 283-297 (2017) - [j94]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang, Jun-bin Fang:
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities. Pervasive Mob. Comput. 39: 52-64 (2017) - [j93]Jingxuan Wang, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Ruoqing Zhang:
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems. Secur. Commun. Networks 2017: 9602357:1-9602357:12 (2017) - [j92]Yuzhi Liang, Pengcheng Yin, Siu-Ming Yiu:
New Word Detection and Tagging on Chinese Twitter Stream. Trans. Large Scale Data Knowl. Centered Syst. 32: 69-90 (2017) - [c187]Puwen Wei, Wei Wang, Bingxin Zhu, Siu-Ming Yiu:
Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency. ACISP (1) 2017: 3-22 - [c186]Jie Yang, Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
Mixed Membership Sparse Gaussian Conditional Random Fields. ADMA 2017: 287-302 - [c185]Menglu Li, Siu-Ming Yiu, Ting-Fung Chan, Ernest T. Lam:
An iterative algorithm for de novo optical map assembly. BIBM 2017: 1952-1958 - [c184]Jun Zhang, Xin Wang, Siu-Ming Yiu, Zoe Lin Jiang, Jin Li:
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM. SCC@AsiaCCS 2017: 75-82 - [c183]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu, Chun-Fai Chan:
Detecting anomalous behavior of PLC using semi-supervised machine learning. CNS 2017: 580-585 - [c182]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu:
Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys. CSE/EUC (1) 2017: 548-555 - [c181]Yulin Wu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage. CSE/EUC (1) 2017: 562-567 - [c180]Jun Zhang, Meiqi He, Siu-Ming Yiu:
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery. DBSec 2017: 185-204 - [c179]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Qing Liao:
Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases. DSC 2017: 124-132 - [c178]Jingxuan Wang, Wenting Tu, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang:
Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques. ICDCS 2017: 2246-2251 - [c177]Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu:
Privacy-Preserving Disease Risk Test Based on Bloom Filters. ICICS 2017: 472-486 - [c176]Xingmin Cui, Ruiyi He, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Eric Ke Wang:
Reconstruction of Task Lists from Android Applications. ICISA 2017: 396-403 - [c175]Junbin Fang, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. IFIP Int. Conf. Digital Forensics 2017: 223-244 - [c174]Chang Liu, Lingwu Zeng, Junzheng Shi, Fei Xu, Gang Xiong, Siu-Ming Yiu:
Auto-identification of background traffic based on autonomous periodic interaction. IPCCC 2017: 1-8 - [c173]Fei Xu, Haiqing Pan, Zigang Cao, Zhen Li, Gang Xiong, Yangyang Guan, Siu-Ming Yiu:
Identifying malware with HTTP content type inconsistency via header-payload comparison. IPCCC 2017: 1-7 - [c172]Kuang-Yu Chang, Yun Cui, Siu-Ming Yiu, Wing-Kai Hon:
Reconstructing One-Articulated Networks with Distance Matrices. ISBRA 2017: 34-45 - [c171]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang:
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. ISPEC 2017: 525-538 - [c170]Jianyu Shi, Hua Huang, Jia-Xin Li, Peng Lei, Yan-Ning Zhang, Siu-Ming Yiu:
Predicting Comprehensive Drug-Drug Interactions for New Drugs via Triple Matrix Factorization. IWBBIO (1) 2017: 108-117 - [c169]Yuzhi Liang, Jia Zhu, Yupeng Li, Min Yang, Siu-Ming Yiu:
Relevant Fact Selection for QA via Sequence Labeling. KSEM 2017: 399-409 - [c168]Gongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au:
A Nonoutsourceable Puzzle Under GHOST Rule. PST 2017: 35-43 - [c167]Meiqi He, Jun Zhang, Gongxian Zeng, Siu-Ming Yiu:
A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database. PST 2017: 293-302 - [c166]Ruoqing Zhang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xiaoqi Yu, Zechao Liu, Zoe Lin Jiang:
A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation. TrustCom/BigDataSE/ICESS 2017: 363-370 - [c165]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties. TrustCom/BigDataSE/ICESS 2017: 1070-1075 - [p2]Junbin Fang, Zoe Lin Jiang, Sijin Li, Siu-Ming Yiu, Lucas C. K. Hui, Kam-Pui Chow:
Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone. Mobile Security and Privacy 2017: 205-216 - [i19]Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu:
Constant bandwidth ORAM with small block size using PIR operations. IACR Cryptol. ePrint Arch. 2017: 590 (2017) - 2016
- [j91]Jesper Jansson, Wing-Kin Sung, Hoa Vu, Siu-Ming Yiu:
Faster Algorithms for Computing the R* Consensus Tree. Algorithmica 76(4): 1224-1244 (2016) - [j90]Chengcheng Xu, Shuhui Chen, Jinshu Su, Siu-Ming Yiu, Lucas Chi Kwong Hui:
A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms. IEEE Commun. Surv. Tutorials 18(4): 2991-3029 (2016) - [j89]Yanbin Tang, Junbin Fang, Kam-Pui Chow, Siu-Ming Yiu, Jun Xu, Bo Feng, Qiong Li, Qi Han:
Recovery of heavily fragmented JPEG files. Digit. Investig. 18 Supplement: S108-S117 (2016) - [j88]Liyang Yu, Huanran Wang, Qi Han, Xiamu Niu, Siu-Ming Yiu, Jun-bin Fang, Zhifang Wang:
Exposing frame deletion by detecting abrupt changes in video streams. Neurocomputing 205: 84-91 (2016) - [j87]Changhui Hu, Lidong Han, Siu-Ming Yiu:
Efficient and secure multi-functional searchable symmetric encryption schemes. Secur. Commun. Networks 9(1): 34-42 (2016) - [c164]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xingmin Cui, Eric Ke Wang, Jun-bin Fang:
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids. ACISP (1) 2016: 40-56 - [c163]Haobin Yao, Tak Wah Lam, Hing-Fung Ting, Siu-Ming Yiu, Yadong Wang, Bo Liu:
Accurate annotation of metagenomic data without species-level references. BIBM 2016: 59-64 - [c162]Jianyu Shi, Ke Gao, Xue-Qun Shang, Siu-Ming Yiu:
LCM-DS: A novel approach of predicting drug-drug interactions for new drugs via Dempster-Shafer theory of evidence. BIBM 2016: 512-515 - [c161]Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang:
Generic Construction of Publicly Verifiable Predicate Encryption. AsiaCCS 2016: 889-894 - [c160]Zoe Lin Jiang, Ruoqing Zhang, Zechao Liu, Siu-Ming Yiu, Lucas C. K. Hui, Xuan Wang, Junbin Fang:
A Revocable Outsourcing Attribute-Based Encryption Scheme. CloudComp 2016: 145-161 - [c159]Xiaoqi Yu, Nairen Cao, Jun Zhang, Siu-Ming Yiu:
Dynamic Proofs of Retrievability with improved worst case overhead. CNS 2016: 576-580 - [c158]Menglu Li, Angel C. Y. Mak, Ernest T. Lam, Pui-Yan Kwok, Ming Xiao, Kevin Y. Yip, Ting-Fung Chan, Siu-Ming Yiu:
Towards a More Accurate Error Model for BioNano Optical Maps. ISBRA 2016: 67-79 - [c157]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Chunkai Zhang, Xiaomeng Zhao:
Dynamic Attribute-Based Access Control in Cloud Storage Systems. Trustcom/BigDataSE/ISPA 2016: 129-137 - [c156]Xiaoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang, Siu-Ming Yiu:
LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation). WISA 2016: 233-244 - [r4]Siu-Ming Yiu, Francis Y. L. Chin:
Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds. Encyclopedia of Algorithms 2016: 621-624 - [r3]Siu-Ming Yiu:
Local Alignment (with Concave Gap Weights). Encyclopedia of Algorithms 2016: 1126-1128 - [i18]Jun-bin Fang, Zhen Che, Xiaolong Yu, Zhe Chen, Zoe Lin Jiang, Siu-Ming Yiu, Kui Ren, Xiaoqing Tan:
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes. CoRR abs/1608.07202 (2016) - [i17]Xin Wang, Siu-Ming Yiu:
A multi-task learning model for malware classification with useful file access pattern from API call sequence. CoRR abs/1610.05945 (2016) - 2015
- [j86]Xiao Zhu, Henry C. M. Leung, Rongjie Wang, Francis Y. L. Chin, Siu-Ming Yiu, Guangri Quan, Yajie Li, Rui Zhang, Qinghua Jiang, Bo Liu, Yucui Dong, Guohui Zhou, Yadong Wang:
misFinder: identify mis-assemblies in an unbiased manner using reference and paired-end reads. BMC Bioinform. 16: 386:1-386:16 (2015) - [j85]Qing Zhan, Yongtao Ye, Tak Wah Lam, Siu-Ming Yiu, Yadong Wang, Hing-Fung Ting:
Improving multiple sequence alignment by using better guide trees. BMC Bioinform. 16(S-5): S4 (2015) - [j84]Christian Schönbach, Paul Horton, Siu-Ming Yiu, Tin Wee Tan, Shoba Ranganathan:
GIW and InCoB are advancing bioinformatics in the Asia-Pacific. BMC Bioinform. 16(S18): I1 (2015) - [j83]Paul Horton, Christian Schönbach, Shoba Ranganathan, Siu-Ming Yiu:
Introduction to selected papers from GIW/InCoB 2015. J. Bioinform. Comput. Biol. 13(5): 1502003:1-1502003:2 (2015) - [j82]Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
IDBA-MTP: A Hybrid Metatranscriptomic Assembler Based on Protein Information. J. Comput. Biol. 22(5): 367-376 (2015) - [j81]Zhian He, Wai Kit Wong, Ben Kao, David Wai-Lok Cheung, Rongbin Li, Siu-Ming Yiu, Eric Lo:
SDB: A Secure Query Processing System with Data Interoperability. Proc. VLDB Endow. 8(12): 1876-1879 (2015) - [j80]Yongtao Ye, David Wai-Lok Cheung, Yadong Wang, Siu-Ming Yiu, Qing Zhan, Tak Wah Lam, Hing-Fung Ting:
GLProbs: Aligning Multiple Sequences Adaptively. IEEE ACM Trans. Comput. Biol. Bioinform. 12(1): 67-78 (2015) - [j79]Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, Jin Zhong:
PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid. IEEE Trans. Dependable Secur. Comput. 12(1): 85-97 (2015) - [c155]Jianyu Shi, Siu-Ming Yiu:
SRP: A concise non-parametric similarity-rank-based model for predicting drug-target interactions. BIBM 2015: 1636-1641 - [c154]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu:
Related Randomness Attacks for Public Key Cryptosystems. AsiaCCS 2015: 215-223 - [c153]Yuzhi Liang, Pengcheng Yin, Siu-Ming Yiu:
New Word Detection and Tagging on Chinese Twitter Stream. DaWaK 2015: 310-321 - [c152]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Data Framing Attacks against Nonlinear State Estimation in Smart Grid. GLOBECOM Workshops 2015: 1-6 - [c151]Nairen Cao, Xiaoqi Yu, Yufang Yang, Linru Zhang, Siu-Ming Yiu:
An ORAM Scheme with Improved Worst-Case Computational Overhead. ICICS 2015: 393-405 - [c150]Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Jun-bin Fang, Xiamu Niu, Qi Han, Xianyan Wu:
Fragmented JPEG File Recovery Using Pseudo Headers. IFIP Int. Conf. Digital Forensics 2015: 215-231 - [c149]Menglu Li, Micheal Cheng, Yongtao Ye, Wing-Kai Hon, Hing-Fung Ting, Tak Wah Lam, Cy Tang, Thomas Wong, Siu-Ming Yiu:
Predicting RNA Secondary Structures: One-grammar-fits-all Solution. ISBRA 2015: 211-222 - [c148]Zhiwei Wang, Siu-Ming Yiu:
CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency. ISC 2015: 319-335 - [c147]Xiaoyan Liu, Zoe Lin Jiang, Siu-Ming Yiu, Xuan Wang, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Jun-bin Fang:
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks. MSN 2015: 124-133 - [c146]Zhiwei Wang, Siu-Ming Yiu:
Attribute-Based Encryption Resilient to Auxiliary Input. ProvSec 2015: 371-390 - [c145]Xingmin Cui, Jingxuan Wang, Lucas Chi Kwong Hui, Zhongwei Xie, Tian Zeng, Siu-Ming Yiu:
WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps. WISEC 2015: 25:1-25:12 - [e3]Lucas Chi Kwong Hui, S. H. Qing, Elaine Shi, Siu-Ming Yiu:
Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8958, Springer 2015, ISBN 978-3-319-21965-3 [contents] - 2014
- [j78]Xihao Hu, Thomas K. F. Wong, Zhi John Lu, Ting-Fung Chan, Terrence Chi-Kong Lau, Siu-Ming Yiu, Kevin Y. Yip:
Computational identification of protein binding sites on RNAs using high-throughput RNA structure-probing data. Bioinform. 30(8): 1049-1055 (2014) - [j77]Yi Wang, Henry Chi-Ming Leung, Siu-Ming Yiu, Francis Y. L. Chin:
MetaCluster-TA: taxonomic annotation for metagenomic data based on assembly-assisted binning. BMC Genom. 15(S-1): S12 (2014) - [j76]Pierre K. Y. Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Modeling the initial stage of a file sharing process on a BitTorrent network. Peer-to-Peer Netw. Appl. 7(4): 311-319 (2014) - [j75]Jun-bin Fang, Zoe Lin Jiang, Kexin Ren, Yunhan Luo, Zhe Chen, Weiping Liu, Xuan Wang, Xiamu Niu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design. Quantum Inf. Process. 13(6): 1425-1435 (2014) - [j74]Yi Jun He, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
UFLE: a user-friendly location-free encryption system for mobile users. Secur. Commun. Networks 7(10): 1477-1487 (2014) - [j73]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
VSPN: VANET-Based Secure and Privacy-Preserving Navigation. IEEE Trans. Computers 63(2): 510-524 (2014) - [c144]Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing:
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. ACISP 2014: 446-453 - [c143]Jianyu Shi, Siu-Ming Yiu, Yiming Li, Henry C. M. Leung, Francis Y. L. Chin:
Predicting drug-target interaction for new drugs using enhanced similarity measures and super-target clustering1. BIBM 2014: 45-50 - [c142]Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu:
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147 - [c141]Cheuk Yu Yeung, W. C. Law, Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui:
Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner. ICCVE 2014: 804-809 - [c140]Jie Yang, Henry C. M. Leung, Siu-Ming Yiu, Yunpeng Cai, Francis Y. L. Chin:
Learning Sparse Gaussian Bayesian Network Structure by Variable Grouping. ICDM 2014: 1073-1078 - [c139]Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang:
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. ICICS 2014: 274-289 - [c138]Xiaojun Chen, Fei Xu, Rui Xu, Siu-Ming Yiu, Jinqiao Shi:
A practical real-time authentication system with Identity Tracking based on mouse dynamics. INFOCOM Workshops 2014: 121-122 - [c137]Jesper Jansson, Wing-Kin Sung, Hoa Vu, Siu-Ming Yiu:
Faster Algorithms for Computing the R* Consensus Tree. ISAAC 2014: 414-425 - [c136]Dan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Assessing cryptographic signature schemes from a legal perspective. PST 2014: 322-329 - [c135]Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
IDBA-MTP: A Hybrid MetaTranscriptomic Assembler Based on Protein Information. RECOMB 2014: 160-172 - [c134]Wai Kit Wong, Ben Kao, David Wai-Lok Cheung, Rongbin Li, Siu-Ming Yiu:
Secure query processing with data interoperability in a cloud database environment. SIGMOD Conference 2014: 1395-1406 - [e2]Sherman S. M. Chow, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Lecture Notes in Computer Science 8783, Springer 2014, ISBN 978-3-319-13256-3 [contents] - [e1]Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. Lecture Notes in Computer Science 8782, Springer 2014, ISBN 978-3-319-12474-2 [contents] - [i16]Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu-Ming Yiu:
Exponent-inversion Signatures and IBE under Static Assumptions. IACR Cryptol. ePrint Arch. 2014: 311 (2014) - 2013
- [j72]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
VANET-based secure taxi service. Ad Hoc Networks 11(8): 2381-2390 (2013) - [j71]Yu Peng, Henry C. M. Leung, Siu-Ming Yiu, Ming-Ju Lv, Xin-Guang Zhu, Francis Y. L. Chin:
IDBA-tran: a more robust de novo de Bruijn graph assembler for transcriptomes with uneven expression levels. Bioinform. 29(13): 326-334 (2013) - [j70]Jikun Wu, Wenqian Zhang, Songbo Huang, Zengquan He, Yanbing Cheng, Jun Wang, Tak Wah Lam, Zhiyu Peng, Siu-Ming Yiu:
SOAPfusion: a robust and effective computational fusion discovery tool for RNA-seq reads. Bioinform. 29(23): 2971-2978 (2013) - [j69]Xianhua Song, Shen Wang, Siu-Ming Yiu, Lin Jiang, Xiamu Niu:
Detection of Image Region Duplication Using Spin Image. IEICE Trans. Inf. Syst. 96-D(7): 1565-1568 (2013) - [j68]Yunming Ye, Qingyao Wu, Yan Li, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Unknown Chinese word extraction based on variety of overlapping strings. Inf. Process. Manag. 49(2): 497-512 (2013) - [j67]Henry C. M. Leung, Siu-Ming Yiu, John Parkinson, Francis Y. L. Chin:
IDBA-MT: De Novo Assembler for Metatranscriptomic Data Generated from Next-Generation Sequencing Technology. J. Comput. Biol. 20(7): 540-550 (2013) - [j66]Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu:
Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 104-113 (2013) - [j65]Ye Zhang, Wai Kit Wong, Siu-Ming Yiu, Nikos Mamoulis, David W. Cheung:
Lightweight Privacy-Preserving Peer-to-Peer Data Integration. Proc. VLDB Endow. 6(3): 157-168 (2013) - [j64]Francis Y. L. Chin, Henry C. M. Leung, Siu-Ming Yiu:
Non-adaptive complex group testing with multiple positive sets. Theor. Comput. Sci. 505: 11-18 (2013) - [j63]Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Heap Graph Based Software Theft Detection. IEEE Trans. Inf. Forensics Secur. 8(1): 101-110 (2013) - [j62]Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. IEEE Trans. Inf. Forensics Secur. 8(5): 821-828 (2013) - [c133]Yongtao Ye, David W. Cheung, Yadong Wang, Siu-Ming Yiu, Qing Zhan, Tak Wah Lam, Hing-Fung Ting:
GLProbs: Aligning multiple sequences adaptively. BCB 2013: 152 - [c132]Xiao Zhu, Henry C. M. Leung, Francis Y. L. Chin, Siu-Ming Yiu, Guangri Quan, Bo Liu, Yadong Wang:
PERGA: A Paired-End Read Guided De Novo Assembler for Extending Contigs Using SVM Approach. BCB 2013: 161 - [c131]Jie Yang, Henry C. M. Leung, Siu-Ming Yiu, Yunpeng Cai, Francis Y. L. Chin:
Intra- and inter-sparse multiple output regression with application on environmental microbial community study. BIBM 2013: 404-409 - [c130]Hao Xiong, Tsz Hon Yuen, Cong Zhang, Siu-Ming Yiu, Yi Jun He:
Leakage-resilient certificateless public key encryption. AsiaPKC@AsiaCCS 2013: 13-22 - [c129]Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He:
Multi-key leakage-resilient threshold cryptography. AsiaCCS 2013: 61-70 - [c128]Y. Liang, Kam-Pui Chow, Lucas Chi Kwong Hui, Jun-bin Fang, Siu-Ming Yiu, Shuhui Hou:
Towards a Better Similarity Measure for Keyword Profiling via Clustering. COMPSAC Workshops 2013: 16-20 - [c127]Tat Wing Chim, Siu-Ming Yiu, Cheuk Yu Yeung, Victor O. K. Li, Lucas C. K. Hui:
Secure, privacy-preserving, distributed motor vehicle event data recorder. ICCVE 2013: 337-342 - [c126]Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu:
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation. ICT-EurAsia 2013: 312-317 - [c125]Hoa Vu, Francis Y. L. Chin, Wing-Kai Hon, Henry C. M. Leung, Kunihiko Sadakane, Ken Wing-Kin Sung, Siu-Ming Yiu:
Reconstructing k-Reticulated Phylogenetic Network from a Set of Gene Trees. ISBRA 2013: 112-124 - [c124]Xuan Liu, David Wai-Lok Cheung, Hing-Fung Ting, Tak Wah Lam, Siu-Ming Yiu:
LCR_Finder: A de Novo Low Copy Repeat Finder for Human Genome. ISBRA 2013: 125-136 - [c123]Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi Jun He, Siu-Ming Yiu:
Attribute Specified Identity-Based Encryption. ISPEC 2013: 60-74 - [c122]Hao Xiong, Xiaoqi Yu, Yi Jun He, Siu-Ming Yiu:
Improved Composite Order Bilinear Pairing on Graphics Hardware. MUE 2013: 731-737 - [c121]Bay-Yuan Hsu, Thomas K. F. Wong, Wing-Kai Hon, Xinyi Liu, Tak Wah Lam, Siu-Ming Yiu:
A Local Structural Prediction Algorithm for RNA Triple Helix Structure. PRIB 2013: 102-113 - [c120]Gang Zhou, Yanbin Tang, Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Rongsheng Xu, Yonghao Mai, Shuhui Hou, Fei Xu:
Photo Forensics on Shanzhai Mobile Phone. WASA 2013: 454-464 - [i15]Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu:
Encryption Schemes with Post-Challenge Auxiliary Inputs. IACR Cryptol. ePrint Arch. 2013: 323 (2013) - 2012
- [j61]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks 10(7): 1445-1456 (2012) - [j60]Chi-Man Liu, Thomas K. F. Wong, Edward Wu, Ruibang Luo, Siu-Ming Yiu, Yingrui Li, Bingqiang Wang, Chang Yu, Xiaowen Chu, Kaiyong Zhao, Ruiqiang Li, Tak Wah Lam:
SOAP3: ultra-fast GPU-based parallel alignment tool for short reads. Bioinform. 28(6): 878-879 (2012) - [j59]Yu Peng, Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
IDBA-UD: a de novo assembler for single-cell and metagenomic sequencing data with highly uneven depth. Bioinform. 28(11): 1420-1428 (2012) - [j58]Yi Wang, Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample. Bioinform. 28(18): 356-362 (2012) - [j57]Binghang Liu, Jianying Yuan, Siu-Ming Yiu, Zhenyu Li, Yinlong Xie, Yanxiang Chen, Yujian Shi, Hao Zhang, Yingrui Li, Tak Wah Lam, Ruibang Luo:
COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly. Bioinform. 28(22): 2870-2874 (2012) - [j56]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
Privacy-preserving advance power reservation. IEEE Commun. Mag. 50(8): 18-23 (2012) - [j55]Changhui Hu, Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
Efficient HMAC-based secure communication for VANETs. Comput. Networks 56(9): 2292-2303 (2012) - [j54]Yi Wang, Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
MetaCluster 4.0: A Novel Binning Algorithm for NGS Reads and Huge Number of Species. J. Comput. Biol. 19(2): 241-249 (2012) - [j53]Thomas K. F. Wong, Siu-Ming Yiu:
Structural Alignment of RNA with Triple Helix Structure. J. Comput. Biol. 19(4): 365-378 (2012) - [j52]Tat Wing Chim, Jeanno Chin Long Cheung, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET. J. Information Security 3(1): 59-67 (2012) - [j51]Thomas K. F. Wong, Y. S. Chiu, Tak Wah Lam, Siu-Ming Yiu:
Memory Efficient Algorithms for Structural Alignment of RNAs with Pseudoknots. IEEE ACM Trans. Comput. Biol. Bioinform. 9(1): 161-168 (2012) - [j50]Christopher Ma, Thomas K. F. Wong, Tak Wah Lam, Wing-Kai Hon, Kunihiko Sadakane, Siu-Ming Yiu:
An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence. IEEE ACM Trans. Comput. Biol. Bioinform. 9(6): 1629-1638 (2012) - [c119]Tsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Fully Leakage-Resilient Signatures with Auxiliary Inputs. ACISP 2012: 294-307 - [c118]Sherman S. M. Chow, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment. ACNS 2012: 526-543 - [c117]Ruibang Luo, Chang Yu, Chi-Man Liu, Tak Wah Lam, Thomas K. F. Wong, Siu-Ming Yiu, Ruiqiang Li, Hing-Fung Ting:
Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples. BCB 2012: 163-169 - [c116]Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. ESORICS 2012: 679-696 - [c115]Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu:
Identity-Based Encryption Resilient to Continual Auxiliary Leakage. EUROCRYPT 2012: 117-134 - [c114]Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu-Ming Yiu, Sihan Qing:
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model. ICICS 2012: 119-130 - [c113]Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu:
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware. ICICS 2012: 341-348 - [c112]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, Kwun Yin Yu:
Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner. ICICS 2012: 445-452 - [c111]Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang:
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. IFIP Int. Conf. Digital Forensics 2012: 129-142 - [c110]Junjie Yu, Henry Chi-Ming Leung, Siu-Ming Yiu, Yong Zhang, Francis Y. L. Chin, Nathan Hobbs, Amy Y. X. Wang:
Phylogenetic Tree Reconstruction with Protein Linkage. ISBRA 2012: 315-327 - [c109]Yi Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Non-Transferable Proxy Re-Encryption Scheme. NTMS 2012: 1-4 - [c108]Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
DroidChecker: analyzing android applications for capability leak. WISEC 2012: 125-136 - 2011
- [j49]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks 9(2): 189-203 (2011) - [j48]Henry C. M. Leung, Siu-Ming Yiu, Bin Yang, Yu Peng, Yi Wang, Zhihua Liu, Jing-Chi Chen, Junjie Qin, Ruiqiang Li, Francis Y. L. Chin:
A robust and accurate binning algorithm for metagenomic sequences with arbitrary species abundance ratio. Bioinform. 27(11): 1489-1495 (2011) - [j47]Yu Peng, Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
Meta-IDBA: a de Novo assembler for metagenomic data. Bioinform. 27(13): 94-101 (2011) - [j46]Thomas K. F. Wong, Kwok-Lung Wan, Bay-Yuan Hsu, Brenda W. Y. Cheung, Wing-Kai Hon, Tak Wah Lam, Siu-Ming Yiu:
RNASAlign: RNA Structural Alignment System. Bioinform. 27(15): 2151-2152 (2011) - [j45]Sherman S. M. Chow, Siu-Ming Yiu:
Exclusion-intersection encryption. Int. J. Secur. Networks 6(2/3): 136-146 (2011) - [j44]Thomas K. F. Wong, Tak Wah Lam, Wing-Kin Sung, Brenda W. Y. Cheung, Siu-Ming Yiu:
Structural Alignment of RNA with Complex Pseudoknot Structure. J. Comput. Biol. 18(1): 97-108 (2011) - [j43]Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Meng-meng Sheng:
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics. J. Zhejiang Univ. Sci. C 12(10): 809-818 (2011) - [j42]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
OPQ: OT-Based Private Querying in VANETs. IEEE Trans. Intell. Transp. Syst. 12(4): 1413-1422 (2011) - [c107]Xuan Liu, Shing-Wan Choi, Thomas K. F. Wong, Tak Wah Lam, Siu-Ming Yiu:
Detection of novel tandem duplication with next-generation sequencing. BCB 2011: 415-419 - [c106]Thomas K. F. Wong, Hui-Ting Yu, Bay-Yuan Hsu, Tak Wah Lam, Wing-Kai Hon, Siu-Ming Yiu:
Algorithms for pseudoknot classification. BCB 2011: 484-486 - [c105]Henry Chi-Ming Leung, Shuen-Yi Leung, Carlos Lu Xiang, Siu-Ming Yiu, Francis Yuk-Lun Chin:
DMPFinder - Finding Differentiating Pathways with Gaps from Two Groups of Metabolic Networks. BICoB 2011: 80-85 - [c104]Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li:
MLAS: multiple level authentication scheme for VANETs. AsiaCCS 2011: 471-475 - [c103]Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Dynamic Software Birthmark for Java Based on Heap Memory Analysis. Communications and Multimedia Security 2011: 94-107 - [c102]Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap. COMPSAC 2011: 407-412 - [c101]Jeanno Chin Long Cheung, Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui:
Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network. GLOBECOM 2011: 1-5 - [c100]Xueling Zheng, Yiu Ming Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Sockpuppet Detection in Online Discussion Forums. IIH-MSP 2011: 374-377 - [c99]Shuhui Hou, Tetsutaro Uehara, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers. IIH-MSP 2011: 378-383 - [c98]Yuk-Ming Lai, Xueling Zheng, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Automatic Online Monitoring and Data-Mining Internet Forums. IIH-MSP 2011: 384-387 - [c97]Francis Y. L. Chin, Henry C. M. Leung, Siu-Ming Yiu:
Adaptive Phenotype Testing for AND/OR Items. ISAAC 2011: 754-763 - [c96]Yu Peng, Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome - (Extended Abstract). RECOMB 2011: 337-338 - [c95]Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7 - [c94]Frank Y. W. Law, Patrick P. F. Chan, Siu-Ming Yiu, Kam-Pui Chow, Michael Y. K. Kwan, Hayson Tse, Pierre K. Y. Lai:
Protecting Digital Data Privacy in Computer Forensic Examination. SADFE 2011: 1-6 - [c93]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
PASS: Privacy-preserving authentication scheme for smart grid network. SmartGridComm 2011: 196-201 - [c92]Francis Y. L. Chin, Henry C. M. Leung, Siu-Ming Yiu:
Non-adaptive Complex Group Testing with Multiple Positive Sets. TAMC 2011: 172-183 - [p1]Thomas K. F. Wong, Siu-Ming Yiu:
Structural Alignment of RNAs with Pseudoknots. Handbook of Research on Computational and Systems Biology 2011: 550-571 - [i14]Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu:
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware. IACR Cryptol. ePrint Arch. 2011: 196 (2011) - 2010
- [j41]Bin Yang, Yu Peng, Henry Chi-Ming Leung, Siu-Ming Yiu, Jing-Chi Chen, Francis Yuk-Lun Chin:
Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers. BMC Bioinform. 11(S-2): 5 (2010) - [j40]Thomas K. F. Wong, Tak Wah Lam, Siu-Ming Yiu, Simon C. K. Wong:
Improving the accuracy of signal transduction pathway construction using level-2 neighbours. Int. J. Bioinform. Res. Appl. 6(6): 542-555 (2010) - [c91]Songbo Huang, Tak Wah Lam, Wing-Kin Sung, Siu-Lung Tam, Siu-Ming Yiu:
Indexing Similar DNA Sequences. AAIM 2010: 180-190 - [c90]Bin Yang, Yu Peng, Henry C. M. Leung, Siu-Ming Yiu, Junjie Qin, Ruiqiang Li, Francis Y. L. Chin:
MetaCluster: unsupervised binning of environmental genomic fragments and taxonomic annotation. BCB 2010: 170-179 - [c89]Shuen-Yi Leung, Henry C. M. Leung, Carlos Lu Xiang, Siu-Ming Yiu, Francis Y. L. Chin:
Predicting metabolic pathways from metabolic networks with limited biological knowledge. BIBM Workshops 2010: 7-12 - [c88]Yizhen Jia, Thomas K. F. Wong, You-Qiang Song, David K. Smith, Siu-Ming Yiu:
Investigation of the Lineage and Tissue Specificity of Genes. BIOCOMP 2010: 306-310 - [c87]Thomas K. F. Wong, Siu-Ming Yiu:
Structure Prediction of Simple Non-standard Pseudoknot. BIOINFORMATICS 2010: 33-38 - [c86]Thomas K. F. Wong, Siu-Ming Yiu:
Prediction of Minimum Free Energy Structure for Simple Non-standard Pseudoknot. BIOSTEC (Selected Papers) 2010: 345-355 - [c85]Eric Ke Wang, Yunming Ye, Xiaofei Xu, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Security Issues and Challenges for Cyber Physical System. GreenCom/CPSCom 2010: 733-738 - [c84]Frank Y. W. Law, Patrick P. F. Chan, Siu-Ming Yiu, Benjamin Tang, Pierre K. Y. Lai, Kam-Pui Chow, Ricci S. C. Ieong, Michael Y. K. Kwan, Wing-Kai Hon, Lucas Chi Kwong Hui:
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics. IFIP Int. Conf. Digital Forensics 2010: 185-194 - [c83]David W. Cheung, Nikos Mamoulis, Wai Kit Wong, Siu-Ming Yiu, Ye Zhang:
Anonymous Fuzzy Identity-Based Encryption for Similarity Search. ISAAC (1) 2010: 61-72 - [c82]Thomas K. F. Wong, Brenda W. Y. Cheung, Tak Wah Lam, Siu-Ming Yiu:
Local Structural Alignment of RNA with Affine Gap Model. ISBRA 2010: 191-202 - [c81]Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung, Siu-Ming Yiu:
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication. Pairing 2010: 96-115 - [c80]Yu Peng, Henry C. M. Leung, Siu-Ming Yiu, Francis Y. L. Chin:
IDBA - A Practical Iterative de Bruijn Graph De Novo Assembler. RECOMB 2010: 426-440 - [i13]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A new key establishment scheme for wireless sensor networks. CoRR abs/1004.0591 (2010) - [i12]Yi Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control. IACR Cryptol. ePrint Arch. 2010: 192 (2010)
2000 – 2009
- 2009
- [j39]Ying Dong, Tat Wing Chim, Victor O. K. Li, Siu-Ming Yiu, Lucas Chi Kwong Hui:
ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Networks 7(8): 1536-1550 (2009) - [j38]Ruiqiang Li, Chang Yu, Yingrui Li, Tak Wah Lam, Siu-Ming Yiu, Karsten Kristiansen, Jun Wang:
SOAP2: an improved ultrafast tool for short read alignment. Bioinform. 25(15): 1966-1967 (2009) - [j37]Francis Y. L. Chin, Henry C. M. Leung, Wei-Lin Li, Siu-Ming Yiu:
Finding optimal threshold for correction error reads in DNA assembling. BMC Bioinform. 10(S-1) (2009) - [j36]Thomas K. F. Wong, Tak Wah Lam, P. Y. Chan, Siu-Ming Yiu:
Correcting short reads with high error rates for improved sequencing result. Int. J. Bioinform. Res. Appl. 5(2): 224-237 (2009) - [j35]Henry Chi-Ming Leung, Man-Hung Siu, Siu-Ming Yiu, Francis Yuk-Lun Chin, Ken Wing-Kin Sung:
Clustering-Based Approach for Predicting Motif Pairs from protein Interaction Data. J. Bioinform. Comput. Biol. 7(4): 701-716 (2009) - [j34]Henry C. M. Leung, Qian Xiang, Siu-Ming Yiu, Francis Y. L. Chin:
Predicting Protein Complexes from PPI Data: A Core-Attachment Approach. J. Comput. Biol. 16(2): 133-144 (2009) - [j33]Zoe Lin Jiang, Siu-Ming Yiu, Y. Dong, Lucas Chi Kwong Hui, Starsky H. Y. Wong:
Secure Chained Threshold Proxy Signature without and with Supervision. J. Softw. Eng. Appl. 2(4): 267-275 (2009) - [c79]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Zoe Lin Jiang, Victor O. K. Li:
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. ADHOCNETS 2009: 160-175 - [c78]Tak Wah Lam, Ruiqiang Li, Alan Tam, Simon C. K. Wong, Edward Wu, Siu-Ming Yiu:
High Throughput Short Read Alignment via Bi-directional BWT. BIBM 2009: 31-36 - [c77]Thomas K. F. Wong, Siu-Ming Yiu, Tak Wah Lam, Wing-Kin Sung:
The 2-Interval Pattern Matching Problems and Its Application to ncRNA Scanning. BICoB 2009: 79-89 - [c76]Bin Yang, Yu Peng, Henry C. M. Leung, Siu-Ming Yiu, Jing-Chi Chen, Francis Y. L. Chin:
Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers. DTMBIO 2009: 3-10 - [c75]Kin Ying Yu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
RFID Forward Secure Authentication Protocol: Flaw and Solution. CISIS 2009: 627-632 - [c74]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A New Practical Scheme for Protecting Web Content. Security and Management 2009: 62-66 - [c73]Eric Ke Wang, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. Security and Management 2009: 179-183 - [c72]Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. Security and Management 2009: 307-313 - [c71]Alan Tam, Edward Wu, Tak Wah Lam, Siu-Ming Yiu:
Succinct Text Indexing with Wildcards. SPIRE 2009: 39-50 - [c70]Thomas K. F. Wong, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu:
Structural Alignment of RNA with Complex Pseudoknot Structure. WABI 2009: 403-414 - [i11]Ye Zhang, Nikos Mamoulis, David W. Cheung, Siu-Ming Yiu, Wai Kit Wong:
Anonymous Fuzzy Identity-based Encryption for Similarity Search. IACR Cryptol. ePrint Arch. 2009: 496 (2009) - 2008
- [j32]Tak Wah Lam, Wing-Kin Sung, Siu-Lung Tam, Chi-Kwong Wong, Siu-Ming Yiu:
Compressed indexing and local alignment of DNA. Bioinform. 24(6): 791-797 (2008) - [j31]Edward Wijaya, Siu-Ming Yiu, Ngo Thanh Son, Kanagasabai Rajaraman, Wing-Kin Sung:
MotifVoter: a novel ensemble method for fine-grained integration of generic motif finders. Bioinform. 24(20): 2288-2295 (2008) - [j30]Wing-Sze Leung, Marie C. M. Lin, David Wai-Lok Cheung, Siu-Ming Yiu:
Filtering of false positive microRNA candidates by a clustering-based approach. BMC Bioinform. 9(S-12) (2008) - [j29]Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Multiplicative Forward-Secure Threshold Signature Scheme. Int. J. Netw. Secur. 7(3): 397-403 (2008) - [j28]Thomas K. F. Wong, Tak Wah Lam, Wanling Yang, Siu-Ming Yiu:
Finding Alternative Splicing Patterns with Strong Support from expressed Sequences on Individual exons/introns. J. Bioinform. Comput. Biol. 6(5): 1021-1033 (2008) - [j27]Ho-Leung Chan, Tak Wah Lam, Wing-Kin Sung, Prudence W. H. Wong, Siu-Ming Yiu:
Non-overlapping Common Substrings Allowing Mutations. Math. Comput. Sci. 1(4): 543-555 (2008) - [c69]Thomas K. F. Wong, Y. S. Chiu, Tak Wah Lam, Siu-Ming Yiu:
A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots. APBC 2008: 89-100 - [c68]Francis Y. L. Chin, Henry C. M. Leung, Man-Hung Siu, Siu-Ming Yiu:
Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency. APBC 2008: 343-352 - [c67]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Authenticated Directed Diffusion. CANS 2008: 366-377 - [c66]Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong:
Chained Threshold Proxy Signature without and with Supervision. CSSE (3) 2008: 837-840 - [c65]Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Improving Disk Sector Integrity Using K-Dimension Hashing. IFIP Int. Conf. Digital Forensics 2008: 87-98 - [c64]Ying Dong, Victor O. K. Li, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Strongly Anonymous Communications in Mobile Ad Hoc Networks. INC 2008: 181-191 - [c63]Sherman S. M. Chow, Siu-Ming Yiu:
Timed-Release Encryption Revisited. ProvSec 2008: 38-51 - [c62]Frank Y. W. Law, Pierre K. Y. Lai, Zoe Lin Jiang, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, C. F. Chong:
Protecting Digital Legal Professional Privilege (LPP) Data. SADFE 2008: 91-101 - [r2]Francis Y. L. Chin, Siu-Ming Yiu:
Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds. Encyclopedia of Algorithms 2008 - [r1]Siu-Ming Yiu:
Local Alignment (with Concave Gap Weights). Encyclopedia of Algorithms 2008 - 2007
- [j26]Wing-Kai Hon, Tak Wah Lam, Kunihiko Sadakane, Wing-Kin Sung, Siu-Ming Yiu:
A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays. Algorithmica 48(1): 23-36 (2007) - [j25]Edward Wijaya, Kanagasabai Rajaraman, Siu-Ming Yiu, Wing-Kin Sung:
Detection of generic spaced motifs using submotif pattern mining. Bioinform. 23(12): 1476-1485 (2007) - [j24]Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui:
Providing distributed certificate authority service in cluster-based mobile ad hoc networks. Comput. Commun. 30(11-12): 2442-2452 (2007) - [j23]Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Accountability in organisations. Int. J. Inf. Comput. Secur. 1(3): 237-255 (2007) - [j22]Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme. Int. J. Netw. Secur. 5(2): 220-223 (2007) - [j21]Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Delegation with supervision. Inf. Sci. 177(19): 4014-4030 (2007) - [c61]Thomas K. F. Wong, Tak Wah Lam, W. L. Yang, Siu-Ming Yiu:
Finding Alternative Splicing Patterns with Strong Support From Expressed Sequences. BIOCOMP 2007: 153-158 - [c60]Tak Wah Lam, Wing-Kin Sung, Siu-Lung Tam, Chi-Kwong Wong, Siu-Ming Yiu:
An Experimental Study of Compressed Indexing and Local Alignments of DNA. COCOA 2007: 242-254 - [c59]Dan T. F. Chan, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. Security and Management 2007: 559-565 - [c58]Zoe Lin Jiang, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu, Pierre K. Y. Lai:
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. FGCN (2) 2007: 141-145 - [c57]Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, H. W. Go:
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks. ICC 2007: 1241-1246 - [c56]Tak Wah Lam, Wing-Kin Sung, Siu-Lung Tam, Siu-Ming Yiu:
Space Efficient Indexes for String Matching with Don't Cares. ISAAC 2007: 846-857 - [c55]Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). ISPEC 2007: 11-19 - [c54]Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:
A Hybrid Approach for Authenticating MPEG-2 Streaming Data. MCAM 2007: 203-212 - [c53]Wang Lian, David W. Cheung, Siu-Ming Yiu:
Maintenance of maximal frequent itemsets in large databases. SAC 2007: 388-392 - [c52]Francis Y. L. Chin, Henry C. M. Leung, Wing-Kin Sung, Siu-Ming Yiu:
The Point Placement Problem on a Line - Improved Bounds for Pairwise Distance Queries. WABI 2007: 372-382 - [c51]Ying Dong, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks. WCNC 2007: 2625-2630 - [i10]Man Ho Au, Siu-Ming Yiu:
Structural Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2007: 422 (2007) - 2006
- [j20]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Practical electronic lotteries with offline TTP. Comput. Commun. 29(15): 2830-2840 (2006) - [j19]Siu-Ming Yiu, S. W. Yiu, Lap-Kei Lee, Eric K. Y. Li, Michael C. L. Yip:
Sharing and access right delegation for confidential documents: A practical solution. Inf. Manag. 43(5): 607-616 (2006) - [j18]Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu, Bruce S. N. Cheung:
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience. Int. J. Netw. Secur. 2(1): 21-28 (2006) - [j17]Ho-Leung Chan, Jesper Jansson, Tak Wah Lam, Siu-Ming Yiu:
Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix. J. Bioinform. Comput. Biol. 4(4): 807-832 (2006) - [j16]Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, S. K. Ip, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Siu-Ming Yiu, Kwun Yin Yu, W. Ju:
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed. IEEE J. Sel. Areas Commun. 24(10): 1889-1900 (2006) - [c50]Man Ho Au, Willy Susilo, Siu-Ming Yiu:
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. ACISP 2006: 223-234 - [c49]P. Y. Chan, Tak Wah Lam, Siu-Ming Yiu:
A More Accurate and Efficient Whole Genome Phylogeny. APBC 2006: 337-352 - [c48]Pierre K. Y. Lai, Siu-Ming Yiu, Kam-Pui Chow, C. F. Chong, Lucas Chi Kwong Hui:
An Efficient Bloom Filter Based Solution for Multiparty Private Matching. Security and Management 2006: 286-292 - [c47]Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu:
A Key-Recovery System for Long-term Encrypted Documents. EDOC Workshops 2006: 52 - 2005
- [j15]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Forward-secure multisignature and blind signature schemes. Appl. Math. Comput. 168(2): 895-908 (2005) - [j14]Siu-Ming Yiu, Prudence W. H. Wong, Tak Wah Lam, Y. C. Mui, Hsiang-fu Kung, Marie C. M. Lin, Y. T. Cheung:
Filtering of Ineffective siRNAs and Improved siRNA Design Tool. Bioinform. 21(2): 144-151 (2005) - [j13]Ho-Leung Chan, Tak Wah Lam, Wing-Kin Sung, Prudence W. H. Wong, Siu-Ming Yiu, X. Fan:
The mutated subsequence problem and locating conserved genes. Bioinform. 21(10): 2271-2278 (2005) - [j12]Henry C. M. Leung, Francis Y. L. Chin, Siu-Ming Yiu, Ronald Rosenfeld, Wai Wan Tsang:
Finding Motifs with Insufficient Number of Strong Binding Sites. J. Comput. Biol. 12(6): 686-701 (2005) - [j11]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Richard W. C. Lui:
A generic anti-spyware solution by access control list at kernel level. J. Syst. Softw. 75(1-2): 227-234 (2005) - [j10]Wang Lian, Nikos Mamoulis, David Wai-Lok Cheung, Siu-Ming Yiu:
Indexing Useful Structural Patterns for XML Query Processing. IEEE Trans. Knowl. Data Eng. 17(7): 997-1009 (2005) - [c46]H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). ACM Southeast Regional Conference (2) 2005: 75-80 - [c45]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. ACISP 2005: 316-328 - [c44]Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Role Activation Management in Role Based Access Control. ACISP 2005: 358-369 - [c43]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. ACNS 2005: 499-512 - [c42]Siu-Ming Yiu, P. Y. Chan, Tak Wah Lam, Wing-Kin Sung, Hing-Fung Ting, Prudence W. H. Wong:
Allowing mismatches in anchors for wholw genome alignment: Generation and effectiveness. APBC 2005: 1-10 - [c41]Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo:
A model to support fine-grained delegation of authorization. Security and Management 2005: 208-212 - [c40]Yan Woo, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:
Dynamic Integrity Verification for Software Self-defense. Security and Management 2005: 327-333 - [c39]Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu, Yan Woo, K. W. Lau, Eric H. M. Li:
Trustworthy Browsing - A Secure Web Accessing Model. EEE 2005: 542-547 - [c38]Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Secure Role Activation and Authorization in the Enterprise Environment. EuroPKI 2005: 22-35 - [c37]Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Ring Signature: Why, How and What Next. EuroPKI 2005: 144-161 - [c36]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
An e-Lottery Scheme Using Verifiable Random Function. ICCSA (3) 2005: 651-660 - [c35]Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Supporting Efficient Authorization in Delegation with Supervision. ICPADS (2) 2005: 240-244 - [c34]Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. ICPADS (2) 2005: 275-279 - [c33]Richard W. C. Lui, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Authorization in Delegation Chains with Strong Non-Repudiation. IWAP 2005: 66-77 - [c32]Ho-Leung Chan, Jesper Jansson, Tak Wah Lam, Siu-Ming Yiu:
Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix. MFCS 2005: 224-235 - [c31]Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Delegation Network. Mycrypt 2005: 99-115 - [c30]Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. SEC 2005: 443-457 - [c29]Y. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks. SecureComm 2005: 149-156 - [c28]Ai Fen Sui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. WCNC 2005: 2088-2093 - [i9]Sherman S. M. Chow, Siu-Ming Yiu:
Exclusion-Intersection Encryption. IACR Cryptol. ePrint Arch. 2005: 377 (2005) - 2004
- [j9]Prudence W. H. Wong, Tak Wah Lam, N. Lu, Hing-Fung Ting, Siu-Ming Yiu:
An efficient algorithm for optimizing whole genome alignment with noise. Bioinform. 20(16): 2676-2684 (2004) - [j8]Wing-Kai Hon, Tak Wah Lam, Siu-Ming Yiu, Ming-Yang Kao, Wing-Kin Sung:
Subtree Transfer Distance For Degree-D Phylogenies. Int. J. Found. Comput. Sci. 15(6): 893-909 (2004) - [j7]Wing-Kai Hon, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu:
Non-shared edges and nearest neighbor interchanges revisited. Inf. Process. Lett. 91(3): 129-134 (2004) - [j6]Wang Lian, David Wai-Lok Cheung, Nikos Mamoulis, Siu-Ming Yiu:
An Efficient and Scalable Algorithm for Clustering XML Documents by Structure. IEEE Trans. Knowl. Data Eng. 16(1): 82-96 (2004) - [c27]Siu Ming Yiu, S. W. Yiu, Lap-Kei Lee, Eric K. Y. Li, Michael C. L. Yip:
Sharing and Access Right Delegation for Confidential Documents: A Practical Solution. ACIS 2004 - [c26]Wing-Kai Hon, Tak Wah Lam, Wing-Kin Sung, Wai-Leuk Tse, Chi-Kwong Wong, Siu-Ming Yiu:
Practical aspects of Compressed Suffix Arrays and FM-Index in Searching DNA Sequences. ALENEX/ANALC 2004: 31-38 - [c25]Prudence W. H. Wong, Tak Wah Lam, Y. C. Mui, Siu-Ming Yiu, Hsiang-fu Kung, Marie C. M. Lin, Y. T. Cheung:
Filtering of Ineffective siRNAs and Improved siRNA Design Tool. APBC 2004: 247-255 - [c24]Ho-Leung Chan, Tak Wah Lam, Wing-Kin Sung, Prudence W. H. Wong, Siu-Ming Yiu:
A Mutation-Sensitive Approach for Locating Conserved Gene Pairs between Related Species. BIBE 2004: 545-552 - [c23]Lucas Chi Kwong Hui, Kam-Pui Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan:
Risk Management of Corporate Confidential Information in Digital Form. COMPSAC 2004: 88-89 - [c22]F. T. Chan, K. P. Chan, Tsong Yueh Chen, Siu-Ming Yiu:
Adaptive Random Testing with CG Constraint. COMPSAC Workshops 2004: 96-99 - [c21]Wing-Kai Hon, Tak Wah Lam, Kunihiko Sadakane, Wing-Kin Sung, Siu-Ming Yiu:
Compressed Index for Dynamic Text. Data Compression Conference 2004: 102-111 - [c20]Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong:
Delegation of signing and decryption rights using pki proxy memo. IASTED Conf. on Software Engineering 2004: 281-285 - [c19]Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu:
The Delegation Problem and Practical PKI-Based Solutions. ICEIS (3) 2004: 73-84 - [c18]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Secure Hierarchical Identity Based Signature and Its Application. ICICS 2004: 480-494 - [c17]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. ICISC 2004: 218-232 - [c16]H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li:
Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. International Conference on Wireless Networks 2004: 202-209 - [c15]Francis Y. L. Chin, Henry C. M. Leung, Siu-Ming Yiu, Tak Wah Lam, Roni Rosenfeld, Wai Wan Tsang, David K. Smith, Y. Jiang:
Finding motifs for insufficient number of sequences with strong binding to transcription facto. RECOMB 2004: 125-132 - [c14]Wang Lian, Nikos Mamoulis, David Wai-Lok Cheung, Siu-Ming Yiu:
Discovering Minimal Infrequent Structures from XML Documents. WISE 2004: 291-302 - [i8]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2004: 108 (2004) - [i7]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. IACR Cryptol. ePrint Arch. 2004: 179 (2004) - [i6]Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. IACR Cryptol. ePrint Arch. 2004: 244 (2004) - [i5]Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. IACR Cryptol. ePrint Arch. 2004: 322 (2004) - [i4]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. IACR Cryptol. ePrint Arch. 2004: 327 (2004) - 2003
- [j5]Bruce S. N. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, J. K. W. Lee, Sylvia L. K. Kwok, Kenneth C. B. Leung:
Content Engineering Agent: A TBL-Based E-Course Development Tool with TQM. Int. J. Distance Educ. Technol. 1(2): 57-71 (2003) - [j4]Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu:
eCX: a secure infrastructure for e-course delivery. Internet Res. 13(2): 116-125 (2003) - [j3]Samuel Ieong, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu:
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs. J. Comput. Biol. 10(6): 981-995 (2003) - [j2]Bruce S. N. Cheung, Lucas Chi Kwong Hui, J. Zhang, Siu-Ming Yiu:
SmartTutor: An intelligent tutoring system in web-based adult education. J. Syst. Softw. 68(1): 11-25 (2003) - [c13]Lok-Lam Cheng, David Wai-Lok Cheung, Siu-Ming Yiu:
Approximate String Matching in DNA Sequences. DASFAA 2003: 303-310 - [c12]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ICISC 2003: 352-369 - [c11]Tak Wah Lam, N. Lu, Hing-Fung Ting, Prudence W. H. Wong, Siu-Ming Yiu:
Efficient Algorithms for Optimizing Whole Genome Alignment with Noise. ISAAC 2003: 364-374 - [i3]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
A Secure Modified ID-Based Undeniable Signature Scheme. IACR Cryptol. ePrint Arch. 2003: 262 (2003) - 2002
- [j1]Wing-Kin Sung, David Yang, Siu-Ming Yiu, David Wai-Lok Cheung, Wai-Shing Ho, Tak Wah Lam:
Automatic construction of online catalog topologies. IEEE Trans. Syst. Man Cybern. Part C 32(4): 382-391 (2002) - [c10]Tak Wah Lam, Kunihiko Sadakane, Wing-Kin Sung, Siu-Ming Yiu:
A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays. COCOON 2002: 401-410 - [i2]Wing-Kai Hon, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu:
Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor Interchanges, and Subtree Transfers. CoRR cs.DS/0211009 (2002) - 2001
- [c9]Samuel Ieong, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu:
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs. BIBE 2001: 183-190 - [c8]Wing-Kin Sung, David Yang, Siu-Ming Yiu, Wai-Shing Ho, David Wai-Lok Cheung, Tak Wah Lam:
Automatic Construction of Online Catalog Topologies. EC-Web 2001: 216-225 - [c7]Lian Wang, David Wai-Lok Cheung, Siu-Ming Yiu:
Indexing Attributes and Reordering Profiles for XML Document Filtering and Information Delivery. WAIM 2001: 355-366 - [i1]Samuel Ieong, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu:
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs. CoRR cs.CE/0111051 (2001) - 2000
- [c6]Karl R. P. H. Leung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Ricky W. M. Tang:
Modeling Web Navigation by Statechart. COMPSAC 2000: 41-47 - [c5]David Wai-Lok Cheung, Lian Wang, Siu-Ming Yiu, Bo Zhou:
Density-Based Mining of Quantitative Association Rules. PAKDD 2000: 257-268 - [c4]David Yang, Wing-Kin Sung, Siu-Ming Yiu, David Wai-Lok Cheung, Wai-Shing Ho, Tak Wah Lam, Sau Dan Lee:
Construction of Online Catalog Topologies Using Decision Trees. WECWIS 2000: 223-230
1990 – 1999
- 1998
- [c3]Bruce S. N. Cheung, Sarah Ho, Siu-Ming Yiu:
A Survey On Online Education. WebNet 1998 - 1996
- [b1]Siu-Ming Yiu:
Tight bound edge guard results on art gallery problems. University of Hong Kong, 1996 - 1995
- [c2]Siu-Ming Yiu:
A generalized fortress problem using k-consecutive vertex guards. CCCG 1995: 139-144 - 1994
- [c1]Siu-Ming Yiu, A. Choi:
Edge Guards on a Fortress. CCCG 1994: 296-301
Coauthor Index
aka: David W. Cheung
aka: Francis Yuk-Lun Chin
aka: Jun-bin Fang
aka: Lucas Chi Kwong Hui
aka: Zoe L. Jiang
aka: Henry Chi-Ming Leung
aka: Jian-Yu Shi
aka: Ken Wing-Kin Sung
aka: H. F. Ting
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint