Siu-ming. Yiu
#137,372
Most Influential Person Now
Siu-ming. Yiu's AcademicInfluence.com Rankings
Siu-ming. Yiucomputer-science Degrees
Computer Science
#6376
World Rank
#6725
Historical Rank
Database
#3468
World Rank
#3614
Historical Rank

Download Badge
Computer Science
Siu-ming. Yiu's Degrees
- PhD Computer Science Chinese University of Hong Kong
- Bachelors Computer Science Chinese University of Hong Kong
Similar Degrees You Can Earn
Why Is Siu-ming. Yiu Influential?
(Suggest an Edit or Addition)Siu-ming. Yiu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler (2012) (4029)
- SOAP2: an improved ultrafast tool for short read alignment (2009) (3439)
- IDBA-UD: a de novo assembler for single-cell and metagenomic sequencing data with highly uneven depth (2012) (2314)
- The sequence and de novo assembly of the giant panda genome (2010) (1018)
- Privacy-Preserving Public Auditing for Secure Cloud Storage (2017) (793)
- Assemblathon 2: evaluating de novo methods of genome assembly in three vertebrate species (2013) (702)
- Multi-key privacy-preserving deep learning in cloud computing (2017) (385)
- The sequence and de novo assembly of the giant panda genome (2010) (341)
- Metamorphic Testing: A New Approach for Generating Next Test Cases (2020) (338)
- Meta-IDBA: a de Novo assembler for metagenomic data (2011) (324)
- IDBA - A Practical Iterative de Bruijn Graph De Novo Assembler (2010) (286)
- Identification of a novel salt tolerance gene in wild soybean by whole-genome sequencing (2014) (283)
- SOAP3: ultra-fast GPU-based parallel alignment tool for short reads (2012) (256)
- SPECS: Secure and privacy enhancing communications schemes for VANETs (2011) (256)
- Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity (2003) (243)
- Erratum: SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler (2015) (223)
- Redefining the structural motifs that determine RNA binding and RNA editing by pentatricopeptide repeat proteins in land plants. (2016) (218)
- An efficient and scalable algorithm for clustering XML documents by structure (2004) (216)
- An Efficient Flicker-Free FEC Coding Scheme for Dimmable Visible Light Communication Based on Polar Codes (2016) (204)
- Predicting Protein Complexes from PPI Data: A Core-Attachment Approach (2009) (192)
- VSPN: VANET-Based Secure and Privacy-Preserving Navigation (2014) (180)
- Efficient Identity Based Ring Signature (2005) (180)
- SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment (2012) (174)
- IDBA-tran: a more robust de novo de Bruijn graph assembler for transcriptomes with uneven expression levels (2013) (170)
- Security Issues and Challenges for Cyber Physical System (2010) (159)
- DroidChecker: analyzing android applications for capability leak (2012) (157)
- SOAP3-dp: Fast, Accurate and Sensitive GPU-Based Short Read Aligner (2013) (150)
- Compressed indexing and local alignment of DNA (2008) (148)
- COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly (2012) (139)
- MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample (2012) (131)
- Genome-Wide Structural Variation Detection by Genome Mapping on Nanochannel Arrays (2015) (127)
- SOAPsplice: Genome-Wide ab initio Detection of Splice Junctions from RNA-Seq Data (2011) (121)
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage (2012) (116)
- High Throughput Short Read Alignment via Bi-directional BWT (2009) (113)
- Two Improved Partially Blind Signature Schemes from Bilinear Pairings (2005) (110)
- A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays (2002) (105)
- SmartTutor: An intelligent tutoring system in web-based adult education (2003) (92)
- A robust and accurate binning algorithm for metagenomic sequences with arbitrary species abundance ratio (2011) (87)
- A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms (2016) (87)
- Filtering of Ineffective siRNAs and Improved siRNA Design Tool (2004) (83)
- Secure query processing with data interoperability in a cloud database environment (2014) (81)
- Identity Based Threshold Ring Signature (2004) (79)
- De novo assembly and characterization of Camelina sativa transcriptome by paired-end sequencing (2013) (76)
- PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid (2015) (72)
- Modeling Web navigation by statechart (2000) (72)
- ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks (2009) (71)
- PASS: Privacy-preserving authentication scheme for smart grid network (2011) (70)
- Predicting drug-target interaction for new drugs using enhanced similarity measures and super-target clustering1 (2014) (70)
- MetaCluster 4.0: A Novel Binning Algorithm for NGS Reads and Huge Number of Species (2012) (69)
- Secure Hierarchical Identity Based Signature and Its Application (2004) (67)
- Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network (2011) (65)
- Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers (2009) (59)
- Predicting RNA secondary structures with arbitrary pseudoknots by maximizing the number of stacking pairs (2001) (58)
- MetaCluster-TA: taxonomic annotation for metagenomic data based on assembly-assisted binning (2014) (56)
- HybridORAM: Practical oblivious cloud storage with constant bandwidth (2018) (52)
- MotifVoter: a novel ensemble method for fine-grained integration of generic motif finders (2008) (51)
- Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating (2018) (50)
- Predicting and understanding comprehensive drug-drug interactions via semi-nonnegative matrix factorization (2018) (48)
- Subgraph Federated Learning with Missing Neighbor Generation (2021) (48)
- MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints (2018) (46)
- Providing distributed certificate authority service in cluster-based mobile ad hoc networks (2007) (46)
- Identity Based Ring Signature: Why, How and What Next (2005) (44)
- Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks (2014) (42)
- Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers (2011) (42)
- Approximate string matching in DNA sequences (2003) (42)
- MetaCluster: unsupervised binning of environmental genomic fragments and taxonomic annotation (2010) (41)
- An Efficient Bloom Filter Based Solution for Multiparty Private Matching (2006) (40)
- Heap Graph Based Software Theft Detection (2013) (39)
- Security and Privacy Issues for Inter-vehicle Communications in VANETs (2009) (39)
- An efficient algorithm for finding dense regions for mining quantitative association rules (2005) (37)
- Practical aspects of Compressed Suffix Arrays and FM-Index in Searching DNA Sequences (2004) (37)
- Protecting Digital Data Privacy in Computer Forensic Examination (2011) (37)
- Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics (2011) (36)
- Detection of generic spaced motifs using submotif pattern mining (2007) (35)
- A Dynamic Trust Framework for Opportunistic Mobile Social Networks (2018) (35)
- Privacy-preserving advance power reservation (2012) (35)
- IDBA-MT: De Novo Assembler for Metatranscriptomic Data Generated from Next-Generation Sequencing Technology (2013) (33)
- Indexing Similar DNA Sequences (2010) (33)
- An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication (2005) (32)
- Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques (2017) (32)
- Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks (2005) (31)
- Promoter-sharing by different genes in human genome – CPNE1 and RBM12 gene pair as an example (2008) (30)
- Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties (2017) (30)
- A multi-task learning model for malware classification with useful file access pattern from API call sequence (2016) (30)
- Separable and Anonymous Identity-Based Key Issuing (2005) (30)
- Sockpuppet Detection in Online Discussion Forums (2011) (30)
- Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator (2014) (29)
- Detecting drug communities and predicting comprehensive drug–drug interactions via balance regularized semi-nonnegative matrix factorization (2019) (29)
- MLAS: multiple level authentication scheme for VANETs (2011) (27)
- Succinct Text Indexing with Wildcards (2009) (27)
- WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps (2015) (26)
- Structural Alignment of RNA with Complex Pseudoknot Structure (2009) (26)
- Failure of phylogeny inferred from multilocus sequence typing to represent bacterial phylogeny (2017) (26)
- OMSV enables accurate and comprehensive identification of large structural variations from nanochannel-based single-molecule optical maps (2017) (26)
- Finding Motifs with Insufficient Number of Strong Binding Sites (2005) (25)
- BTM - An Automated Rule-based BT Monitoring System for Piracy Detection (2007) (25)
- SOAPfusion: a robust and effective computational fusion discovery tool for RNA-seq reads (2013) (25)
- Fair hierarchical secret sharing scheme based on smart contract (2021) (25)
- Efficient HMAC-based secure communication for VANETs (2012) (25)
- Event-Oriented k-Times Revocable-iff-Linked Group Signatures (2006) (25)
- Dynamic Software Birthmark for Java Based on Heap Memory Analysis (2011) (24)
- PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation (2012) (24)
- Exposing frame deletion by detecting abrupt changes in video streams (2016) (23)
- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware (2012) (23)
- Correction: SOAP3-dp: Fast, Accurate and Sensitive GPU-Based Short Read Aligner (2013) (22)
- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication (2010) (22)
- TMFUF: a triple matrix factorization-based unified framework for predicting comprehensive drug-drug interactions of new drugs (2018) (22)
- Space Efficient Indexes for String Matching with Don't Cares (2007) (21)
- ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment (2020) (21)
- A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities (2017) (21)
- Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix (2005) (21)
- An improved parameter estimation scheme for image modification detection based on DCT coefficient analysis. (2016) (20)
- CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android (2014) (20)
- An e-Lottery Scheme Using Verifiable Random Function (2005) (20)
- GLProbs: aligning multiple sequences adaptively (2015) (20)
- A privilege escalation vulnerability checking system for android applications (2011) (20)
- SDB: A Secure Query Processing System with Data Interoperability (2015) (19)
- Timed-Release Encryption Revisited (2008) (19)
- JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap (2011) (19)
- BMCMDA: a novel model for predicting human microbe-disease associations via binary matrix completion (2018) (19)
- PERGA: A Paired-End Read Guided De Novo Assembler for Extending Contigs Using SVM and Look Ahead Approach (2014) (19)
- Forward-secure multisignature and blind signature schemes (2005) (19)
- Non-adaptive complex group testing with multiple positive sets (2011) (19)
- VANET-based secure taxi service (2013) (18)
- A unified solution for different scenarios of predicting drug-target interactions via triple matrix factorization (2018) (18)
- Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks (2015) (18)
- File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics (2018) (18)
- Incentive evolutionary game model for opportunistic social networks (2020) (18)
- IDBA-MTP: A Hybrid MetaTranscriptomic Assembler Based on Protein Information (2014) (18)
- A generic anti-spyware solution by access control list at kernel level (2005) (17)
- Location spoofing attack detection with pre-installed sensors in mobile devices (2020) (17)
- Recovery of heavily fragmented JPEG files (2016) (17)
- Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed (2006) (17)
- Predicting combinative drug pairs towards realistic screening via integrating heterogeneous features (2017) (17)
- Detecting anomalous behavior of PLC using semi-supervised machine learning (2017) (17)
- Adaptive random testing with CG constraint (2004) (16)
- Practical electronic lotteries with offline TTP (2006) (16)
- GLProbs: Aligning Multiple Sequences Adaptively (2013) (16)
- T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome - (Extended Abstract) (2011) (16)
- A Game-Theoretic Framework for Incentive Mechanism Design in Federated Learning (2020) (15)
- Indexing useful structural patterns for XML query processing (2005) (15)
- Leakage-resilient certificateless public key encryption (2013) (15)
- Fully Leakage-Resilient Signatures with Auxiliary Inputs (2012) (15)
- The Point Placement Problem on a Line - Improved Bounds for Pairwise Distance Queries (2007) (15)
- Attribute-Based Encryption Resilient to Auxiliary Input (2015) (15)
- Filtering of false positive microRNA candidates by a clustering-based approach (2008) (15)
- misFinder: identify mis-assemblies in an unbiased manner using reference and paired-end reads (2015) (15)
- Finding optimal threshold for correction error reads in DNA assembling (2009) (15)
- Unknown Chinese word extraction based on variety of overlapping strings (2013) (15)
- Offline/online attribute‐based encryption with verifiable outsourced decryption (2017) (15)
- Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing (2020) (15)
- Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM (2017) (15)
- Application of 16S rRNA metagenomics to analyze bacterial communities at a respiratory care centre in Taiwan (2015) (15)
- Dynamic Attribute-Based Access Control in Cloud Storage Systems (2016) (14)
- SRP: A concise non-parametric similarity-rank-based model for predicting drug-target interactions (2015) (14)
- Reconstructing an ultrametric galled phylogenetic network from a distance matrix. (2006) (14)
- Finding motifs for insufficient number of sequences with strong binding to transcription facto (2004) (14)
- Maintenance of maximal frequent itemsets in large databases (2007) (14)
- Compressed index for dynamic text (2004) (14)
- Global small RNA analysis in fast-growing Arabidopsis thaliana with elevated concentrations of ATP and sugars (2014) (13)
- Towards a More Accurate Error Model for BioNano Optical Maps (2016) (13)
- Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control (2010) (13)
- Automatic Construction of Online Catalog Topologies (2001) (12)
- Sequence assembly using next generation sequencing data—challenges and solutions (2014) (12)
- OPQ: OT-Based Private Querying in VANETs (2011) (12)
- An Efficient Scheme for Hard Disk Integrity Check in Digital Forensics by Hashing with Combinatorial Group Testing (2011) (12)
- Predicting binary, discrete and continued lncRNA-disease associations via a unified framework based on graph regression (2017) (12)
- Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones (2012) (12)
- A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation (2017) (12)
- Refining orthologue groups at the transcript level (2010) (12)
- Content Engineering Agent: A TBL-Based E-Course Development Tool with TQM (2003) (12)
- Signcryption in Hierarchical Identity Based Cryptosystem (2005) (11)
- BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis (2019) (11)
- Generic server-aided secure multi-party computation in cloud computing (2022) (11)
- Exponent-inversion Signatures and IBE under Static Assumptions (2014) (11)
- Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing (2018) (11)
- Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs) (2005) (11)
- Anonymous Fuzzy Identity-Based Encryption for Similarity Search (2010) (11)
- Insider threat prediction based on unsupervised anomaly detection scheme for proactive forensic investigation (2021) (10)
- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner (2012) (10)
- Efficient and secure multi-functional searchable symmetric encryption schemes (2016) (10)
- Deep Fusion Feature Based Object Detection Method for High Resolution Optical Remote Sensing Images (2019) (10)
- A VCG-based Fair Incentive Mechanism for Federated Learning (2020) (10)
- A Secure Modified ID-Based Undeniable Signature Scheme (2003) (10)
- Identity Based Delegation Network (2005) (9)
- Lightweight Privacy-Preserving Peer-to-Peer Data Integration (2013) (9)
- Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper) (2007) (9)
- An Attack on Libert et al.' s ID-based Undeniable Signature Scheme (2007) (9)
- Secure, privacy-preserving, distributed motor vehicle event data recorder (2013) (9)
- RFID Forward Secure Authentication Protocol: Flaw and Solution (2009) (9)
- Improving Disk Sector Integrity Using 3-dimension Hashing Scheme (2007) (9)
- Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties (2017) (9)
- Improving multiple sequence alignment by using better guide trees (2015) (8)
- BASE: a practical de novo assembler for large genomes using long NGS reads (2016) (8)
- LCM-DS: A novel approach of predicting drug-drug interactions for new drugs via Dempster-Shafer theory of evidence (2016) (8)
- An Integrated Local Classification Model of Predicting Drug-Drug Interactions via Dempster-Shafer Theory of Evidence (2018) (8)
- Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers (2018) (8)
- Improving Disk Sector Integrity Using K-Dimension Hashing (2008) (8)
- Exclusion-intersection encryption (2011) (8)
- Protecting Digital Legal Professional Privilege (LPP) Data (2008) (8)
- Density-Based Mining of Quantitative Association Rules (2000) (8)
- An efficient algorithm for optimizing whole genome alignment with noise (2004) (8)
- Delegation with supervision (2007) (8)
- Data Framing Attacks against Nonlinear State Estimation in Smart Grid (2015) (7)
- Anonymous Counting Problem in Trust Level Warning System for VANET (2019) (7)
- Compound-protein interaction prediction by deep learning: databases, descriptors and models. (2022) (7)
- Predicting combinative drug pairs via multiple classifier system with positive samples only (2019) (7)
- Automatic Online Monitoring and Data-Mining Internet Forums (2011) (7)
- A Nonoutsourceable Puzzle Under GHOST Rule (2017) (7)
- A Key-Recovery System for Long-term Encrypted Documents (2006) (7)
- Checking key integrity efficiently for high-speed quantum key distribution using combinatorial group testing (2011) (7)
- Understanding deep face anti-spoofing: from the perspective of data (2020) (7)
- Structural Alignment of RNA with Triple Helix Structure (2012) (7)
- A Forensic Logging System for Siemens Programmable Logic Controllers (2018) (7)
- Sharing and access right delegation for confidential documents: A practical solution (2006) (7)
- RNASAlign: RNA Structural Alignment System (2011) (7)
- Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys (2017) (7)
- Memory Efficient Algorithms for Structural Alignment of RNAs with Pseudoknots (2012) (7)
- Hard Disk Integrity Check by Hashing with Combinatorial Group Testing (2009) (7)
- Construction of online catalog topologies using decision trees (2000) (7)
- Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices (2018) (7)
- eCX: a secure infrastructure for e-course delivery (2003) (6)
- Role Activation Management in Role Based Access Control (2005) (6)
- Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions (2019) (6)
- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation (2013) (6)
- Privacy-preserving verifiable elastic net among multiple institutions in the cloud (2018) (6)
- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model (2012) (6)
- Complete plastid genomes of the genus Ammopiptanthus and identification of a novel 23-kb rearrangement (2017) (6)
- A More Accurate and Efficient Whole Genome Phylogeny (2005) (6)
- SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET (2012) (6)
- Weighted average problem revisited under hybrid and malicious model (2012) (6)
- Finding linear motif pairs from protein interaction networks: a probabilistic approach. (2007) (6)
- Predicting Comprehensive Drug-Drug Interactions for New Drugs via Triple Matrix Factorization (2017) (6)
- Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery (2017) (5)
- A new key establishment scheme for wireless sensor networks (2010) (5)
- Non-Transferable Proxy Re-Encryption Scheme (2012) (5)
- A practical real-time authentication system with Identity Tracking based on mouse dynamics (2014) (5)
- Adjacent Nucleotide Dependence in ncRNA and Order-1 SCFG for ncRNA Identification (2010) (5)
- Clustering-Based Approach for Predicting Motif Pairs from protein Interaction Data (2009) (5)
- A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids (2016) (5)
- The mutated subsequence problem and locating conserved genes (2005) (5)
- Identification of device motion status via Bluetooth discovery (2020) (5)
- Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning (2020) (5)
- Comparison of Small RNA Profiles of Glycine max and Glycine soja at Early Developmental Stages (2016) (5)
- Computational identification of protein binding sites on RNAs using high-throughput RNA structure-probing data (2014) (5)
- Out-domain Chinese new word detection with statistics-based character embedding (2019) (5)
- Related Randomness Attacks for Public Key Cryptosystems (2015) (5)
- Outsourced Privacy Preserving SVM with Multiple Keys (2018) (5)
- Correcting short reads with high error rates for improved sequencing result (2009) (5)
- A data-mining approach for multiple structural alignment of proteins (2010) (4)
- Finding Alternative Splicing Patterns with Strong Support From Expressed Sequences (2008) (4)
- Encryption Schemes with Post-Challenge Auxiliary Inputs (2013) (4)
- Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency (2007) (4)
- A Survey On Online Education (1998) (4)
- Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key (2021) (4)
- Effective Moment Feature Vectors for Protein Domain Structures (2013) (4)
- PERGA: A Paired-End Read Guided De Novo Assembler for Extending Contigs Using SVM Approach (2013) (4)
- Deep analysis and optimization of CARD antibiotic resistance gene discovery models (2019) (4)
- A Secure and Self-tallying E-voting System Based on Blockchain (2019) (4)
- Edge Guards on a Fortress (1994) (4)
- Multi-key leakage-resilient threshold cryptography (2013) (4)
- A novel adversarial example detection method for malicious PDFs using multiple mutated classifiers (2021) (4)
- De novo assembly and characterization of Camelina sativatranscriptome by paired-end sequencing (2013) (4)
- Non-shared edges and nearest neighbor interchanges revisited (2004) (4)
- Decentralized Search on Decentralized Web (2018) (4)
- GIW and InCoB, two premier bioinformatics conferences in Asia with a combined 40 years of history (2015) (4)
- eavesROP: Listening for ROP Payloads in Data Streams (2016) (3)
- Whole Genome Sequencing On Donor Cell Leukemia in a Patient with Multiple Myeloma Identified Gene Mutations That May Provide Insights to Leukemogenesis. (2012) (3)
- Avoid illegal encrypted DRM content sharing with non-transferable re-encryption (2011) (3)
- Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties (2018) (3)
- A Hybrid Approach for Authenticating MPEG-2 Streaming Data (2007) (3)
- A generalized fortress problem using k-consecutive vertex guards (2001) (3)
- Digital Forensic on MTK-based Shanzhai Mobile Phone with NAND Flash (2012) (3)
- Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency (2017) (3)
- Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience (2006) (3)
- Trustworthy Browsing - a secure Web accessing model (2005) (3)
- F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems (2017) (3)
- Applying Forward Security and Threshold Cryptography in Ad Hoc Networks (2004) (3)
- A mutation-sensitive approach for locating conserved gene pairs between related species (2004) (3)
- Strong Known Related-Key Attacks and the Security of ECDSA (2019) (3)
- Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting (2022) (3)
- Classification with Rejection: Scaling Generative Classifiers with Supervised Deep Infomax (2020) (3)
- A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots (2007) (3)
- Structural Alignment of RNAs with Pseudoknots (2011) (3)
- Faster Algorithms for Computing the R* Consensus Tree (2014) (3)
- Edge guards for the fortress problem (2001) (3)
- An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis (2019) (3)
- Defend against Internet censorship in named data networking (2016) (3)
- Efficient Methods for Multiple Sequence Alignment with Guaranteed Error Bounds (2008) (3)
- A Light-Weight Crowdsourcing Aggregation in Privacy-Preserving Federated Learning System (2020) (3)
- Identifying Volatile Data from Multiple Memory Dumps in Live Forensics (2010) (3)
- Authenticated Directed Diffusion (2008) (3)
- DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks (2018) (3)
- Modeling the initial stage of a file sharing process on a BitTorrent network (2014) (3)
- Controllable Dictionary Example Generation: Generating Example Sentences for Specific Targeted Audiences (2022) (3)
- Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration (2017) (3)
- Defending Against Model Inversion Attack by Adversarial Examples (2021) (3)
- Optimal Procurement Auction for Cooperative Production of Virtual Products: Vickrey-Clarke-Groves Meet Cremer-McLean (2020) (3)
- New Word Detection and Tagging on Chinese Twitter Stream (2015) (3)
- The WHO Hardware Token Security Model ( Position Paper ) (2006) (2)
- CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency (2015) (2)
- Distributing blackbox data to multiple vehicles in a secure and privacy-preserving manner (2014) (2)
- Efficient Algorithms for Optimizing Whole Genome Alignment with Noise (2003) (2)
- Indexing Attributes and Reordering Profiles for XML Document Filtering and Information Delivery (2001) (2)
- An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence (2012) (2)
- Coarse-to-fine two-stage semantic video carving approach in digital forensics (2020) (2)
- Intra- and inter-sparse multiple output regression with application on environmental microbial community study (2013) (2)
- Subtree Transfer Distance For Degree-D Phylogenies (2004) (2)
- From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions (2019) (2)
- Privacy-Preserving Disease Risk Test Based on Bloom Filters (2017) (2)
- WWW Technologies and Adult Continuing Education (1998) (2)
- A Revocable Outsourcing Attribute-Based Encryption Scheme (2016) (2)
- A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database (2017) (2)
- Multiplicative Forward-Secure Threshold Signature Scheme (2008) (2)
- Title T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome (2013) (2)
- Predicting metabolic pathways from metabolic networks with limited biological knowledge (2010) (2)
- A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis (2021) (2)
- PAITS: Detecting Masquerader via Short-Lived Interventional Mouse Dynamics (2014) (2)
- A model to support fine-grained delegation of authorization (2005) (2)
- Efficient Authorization in Delegation Chains with Strong Non-Repudiation (2005) (2)
- A Self-Tallying Electronic Voting Based on Blockchain (2021) (2)
- An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks (2007) (2)
- Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes (2016) (2)
- Title Global small RNA analysis in fast-growing Arabidopsis thalianawith elevated concentrations of ATP and sugars (2014) (2)
- GIW and InCoB are advancing bioinformatics in the Asia-Pacific (2015) (2)
- Privacy-Preserving Information Gathering Using VANET (2012) (2)
- Relevant Fact Selection for QA via Sequence Labeling (2017) (1)
- Classifying encrypted traffic using adaptive fingerprints with multi-level attributes (2021) (1)
- Detection of Image Region Duplication Using Spin Image (2013) (1)
- Identifying malware with HTTP content type inconsistency via header-payload comparison (2017) (1)
- Attribute Specified Identity-Based Encryption (2013) (1)
- Semantic Video Carving Using Perceptual Hashing and Optical Flow (2017) (1)
- Advances in security research in the Asiacrypt region (2020) (1)
- Privacy-Preserving Distributed Machine Learning Made Faster (2022) (1)
- Blind Polynomial Evaluation and Data Trading (2021) (1)
- Discovering Minimal Infrequent Structures from XML Documents (2004) (1)
- Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions (2020) (1)
- Delegation of signing and decryption rights using pki proxy memo (2004) (1)
- Reconstructing k-Reticulated Phylogenetic Network from a Set of Gene Trees (2013) (1)
- Analyzing the Error Rates of Bitcoin Clustering Heuristics (2022) (1)
- GIW and InCoB are advancing bioinformatics in the Asia-Pacific (2015) (1)
- A New Privacy-Preserving Searching Model on Blockchain (2018) (1)
- How to Reverse Engineer ICS Protocols Using Pair-HMM (2018) (1)
- Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines (2020) (1)
- Title PRGA : Privary-preserving Recording & Gateway-AssistedAuthentication of Power Usage Information for Smart Grid (2015) (1)
- Improving somatic variant identification through integration of genome and exome data (2017) (1)
- Decentralized Multi-Client Attribute Based Functional Encryption (2020) (1)
- Towards a Better Similarity Measure for Keyword Profiling via Clustering (2013) (1)
- Title MetaCluster-TA : taxonomic annotation for metagenomic databased on assembly-assisted binning (2014) (1)
- An iterative algorithm for de novo optical map assembly (2017) (1)
- Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability (2009) (1)
- Local structural alignment of RNA with affine gap model (2010) (1)
- Dynamic Integrity Verification for Software Self-defense (2005) (1)
- Title An Efficient and Scalable Algorithm for Clustering XMLDocuments by Structure (2001) (1)
- BitAnalysis: A Visualization System for Bitcoin Wallet Investigation (2023) (1)
- Title Refining orthologue groups at the transcript level (2010) (1)
- Study of Censorship in Named Data Networking (2016) (1)
- Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design (2014) (1)
- Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection (2018) (1)
- An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster (2020) (1)
- Modeling Web Navigation by Statechart *t (2000) (1)
- Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES (2021) (1)
- Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data (2013) (1)
- Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain (2023) (1)
- Assessing cryptographic signature schemes from a legal perspective (2014) (1)
- Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation (2013) (1)
- Privacy-preserving multikey computing framework for encrypted data in the cloud (2021) (1)
- Multi-Dimensional Bloom Filter: Design and Evaluation (2017) (1)
- Learning Sparse Gaussian Bayesian Network Structure by Variable Grouping (2014) (1)
- An Incident Response Model for Industrial Control System Forensics Based on Historical Events (2019) (1)
- Structural Identity-Based Encryption (2007) (1)
- Chained Threshold Proxy Signature without and with Supervision (2008) (1)
- Supporting E.cient Authorization in Delegation with Supervision (2005) (1)
- Making Private Function Evaluation Safer, Faster, and Simpler (2021) (1)
- Title Automatic construction of online catalog topologies (2001) (1)
- A Dual Cube Hashing Scheme for Solving LPP Integrity Problem (2011) (1)
- LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks (2020) (1)
- Title Unsupervised binning of environmental genomic fragmentsbased on an error robust selection of l-mers (2010) (1)
- Reject Illegal Inputs: Scaling Generative Classifiers with Supervised Deep Infomax (2019) (1)
- Detection on auto clickers in mobile games (2019) (1)
- Reconstructing One-Articulated Networks with Distance Matrices (2017) (1)
- ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM (2020) (1)
- Ensuring Dynamic Data Integrity based on Variable Block-size BLS in Untrusted Environment (2013) (1)
- MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle (2022) (0)
- Faster Algorithms for Computing the R* Consensus Tree (2016) (0)
- Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability (2022) (0)
- Structure Prediction of Simple Non-standard Pseudoknot (2010) (0)
- Title GLProbs : Aligning multiple sequences adaptively (2015) (0)
- Asymmetric Group Message Franking: Definitions and Constructions (2023) (0)
- Improving the accuracy of signal transduction pathway construction using level-2 neighbours (2008) (0)
- Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud (2012) (0)
- Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model (2020) (0)
- A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting (2020) (0)
- Privacy-preserving Citizen Journalism (2016) (0)
- Mixed Membership Sparse Gaussian Conditional Random Fields (2017) (0)
- Algorithms for pseudoknot classification (2011) (0)
- Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform (2018) (0)
- Curriculum Sampling for Dense Retrieval with Document Expansion (2022) (0)
- Predicting RNA Secondary Structures: One-grammar-fits-all Solution (2015) (0)
- FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing (2023) (0)
- MLGL-MP: a Multi-Label Graph Learning framework enhanced by pathway interdependence for Metabolic Pathway prediction (2022) (0)
- An ORAM Scheme with Improved Worst-Case Computational Overhead (2015) (0)
- Title Finding optimal threshold for correction error reads in DNAassembling (2009) (0)
- Editorial: Security and Privacy in Computing and Communications (2020) (0)
- Title An Efficient Alignment Algorithm for Searching SimplePseudoknots over Long Genomic Sequence (2012) (0)
- OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm (2019) (0)
- Accountability in organisations (2007) (0)
- Title SOAP 3-dp : Fast , Accurate and Sensitive GPU-Based Short (2013) (0)
- NNAN: Nearest Neighbor Attention Network to Predict Drug–Microbe Associations (2022) (0)
- Sensitivity analysis for a Bitcoin simulation model (2022) (0)
- A Local Structural Prediction Algorithm for RNA Triple Helix Structure (2013) (0)
- A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions (2022) (0)
- Strongly Anonymous Communications in Mobile Ad Hoc Networks (2008) (0)
- Securer and Faster Privacy-Preserving Distributed Machine Learning (2022) (0)
- On Predicting and Generating a Good Break Shot in Billiards Sports (2022) (0)
- Detection of novel tandem duplication with next-generation sequencing (2011) (0)
- Deep Multiple Instance Learning For Forecasting Stock Trends Using Financial News (2022) (0)
- Discovery of transcription factor binding sites through integration of generic motif finders (2007) (0)
- Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning (2022) (0)
- A Spa e and Time EÆ ient Algorithm forConstru ting Compressed SuÆx (2002) (0)
- A New Practical Scheme for Protecting Web Content (2009) (0)
- Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature (2022) (0)
- Title Construction of online catalog topologies using decision trees (2000) (0)
- Title PASS : Privacy-preserving authentication scheme for smart gridnetwork (2011) (0)
- Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone (2017) (0)
- Title Supporting efficient authorization in delegation with supervision (2005) (0)
- Accurate annotation of metagenomic data without species-level references (2016) (0)
- ' s response to reviews Title : SOAPdenovo 2 : Empirically improved memory-efficient short (2012) (0)
- Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks (2007) (0)
- Generic Construction of Publicly Verifiable Predicate Encryption (2016) (0)
- Privacy-Preserving P2P Information Sharing Protocol for Mobile Social Networks (2013) (0)
- Tight bound edge guard results on art gallery problems (1996) (0)
- A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage (2018) (0)
- A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking (2009) (0)
- Fragmented JPEG File Recovery Using Pseudo Headers (2015) (0)
- LCR_Finder: A de Novo Low Copy Repeat Finder for Human Genome (2013) (0)
- Title Hard disk integrity check by hashing with combinatorial grouptesting (2009) (0)
- Provable Security (2014) (0)
- M ULTIPLE I NSTANCE L EARNING N ETWORKS FOR S TOCK M OVEMENTS P REDICTION WITH F INANCIAL N EWS (2022) (0)
- Title MetaCluster 4 . 0 : A novel binning algorithm for NGS reads andhuge number of species (2012) (0)
- The Possibility of Solving a 3x3 Rubik’s Cube under 3 Seconds (2022) (0)
- Dynamic Proofs of Retrievability with improved worst case overhead (2016) (0)
- Corrigendum: NNAN: Nearest Neighbor Attention Network to Predict Drug–Microbe Associations (2022) (0)
- Two Improved Partially Blind Signature S hemesfrom Bilinear (2004) (0)
- Title Acceleration of composite order bilinear pairing on graphicshardware (2011) (0)
- The Delegation Problem and Practical PKI-Based Solutions (2004) (0)
- Allowing mismatches in anchors for wholw genome alignment: Generation and effectiveness (2005) (0)
- Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard (2007) (0)
- Detecting Anomalous Programmable Logic Controller Events Using Process Mining (2021) (0)
- Erratum (1989) (0)
- MetaCluster-TA: taxonomic annotation for metagenomic data based on assembly-assisted binning (2014) (0)
- Information and Communications Security (2014) (0)
- Application of 16S rRNA metagenomics to analyze bacterial communities at a respiratory care centre in Taiwan (2014) (0)
- DMPFinder - Finding Differentiating Pathways with Gaps from Two Groups of Metabolic Networks (2011) (0)
- Risk management of corporate confidential information in digital form (2004) (0)
- Title Efficient key integrity verification for quantum cryptographyusing combinatorial group testing (2010) (0)
- A heuristic graph partitioning method to minimize remote communication costs (2020) (0)
- Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties (2017) (0)
- Detection on GPS Spoofing in Location Based Mobile Games (2020) (0)
- Title Intrusion detection routers : Design , implementation andevaluation using an experimental testbed (2006) (0)
- Adaptive Phenotype Testing for AND/OR Items (2011) (0)
- RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks (2022) (0)
- Investigation of the Lineage and Tissue Specificity of Genes (2010) (0)
- Photo Forensics on Shanzhai Mobile Phone (2013) (0)
- Secure End-to-End Browsing System with Mobile Composition (2011) (0)
- Local Alignment (with Concave Gap Weights) (2016) (0)
- Improved Zero-Knowledge Argument of Encrypted Extended Permutation (2021) (0)
- Reconstruction of Task Lists from Android Applications (2017) (0)
- Chapter 13 FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS (2015) (0)
- Exploring the Correlation between Likelihood of Flow-based Generative Models and Image Semantics (2019) (0)
- Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples (2012) (0)
- Asymmetric Group Message Franking: Definitions & Constructions (2023) (0)
- Forced Independent Optimized Implementation of 4-Bit S-Box (2021) (0)
- A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem1 (2012) (0)
- Efficient key integrity verification for quantum cryptography using combinatorial group testing (2010) (0)
- ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM (2020) (0)
- Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys (2020) (0)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (2020) (0)
- Title Failure of phylogeny inferred from multilocus sequence typingto represent bacterial phylogeny (2017) (0)
- I NTRODUCTION OF A N OVEL A NOMALOUS S OUND D ETECTION M ETHODOLOGY (2022) (0)
- Auto-identification of background traffic based on autonomous periodic interaction (2017) (0)
- Information Security (2014) (0)
- Hacking CCTV by changing time (2021) (0)
- Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases (2017) (0)
- A tight bound for combinatorial edge guards in orthogonal polygons (1993) (0)
- Title The mutated subsequence problem and locating conservedgenes (2005) (0)
- Additional file 2: of A unified solution for different scenarios of predicting drug-target interactions via triple matrix factorization (2018) (0)
- Phylogenetic Tree Reconstruction with Protein Linkage (2012) (0)
- Prediction of Minimum Free Energy Structure for Simple Non-standard Pseudoknot (2010) (0)
- JPEG image width estimation for file carving (2018) (0)
- Constant bandwidth ORAM with small block size using PIR operations (2017) (0)
- D EEP M ULTIPLE I NSTANCE L EARNING FOR F ORECASTING S TOCK T RENDS USING F INANCIAL N EWS (2022) (0)
- State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems (2023) (0)
- Improved Composite Order Bilinear Pairing on Graphics Hardware (2013) (0)
- Additional file 1: of A unified solution for different scenarios of predicting drug-target interactions via triple matrix factorization (2018) (0)
- Sign ryption in Hierar hi al Identity Based (2004) (0)
- Secure Role Activation and Authorization in the Enterprise Environment (2005) (0)
- Non-overlapping Common Substrings Allowing Mutations (2008) (0)
- Revised Selected Papers of the 16th International Conference on Information and Communications Security - Volume 8958 (2014) (0)
- The 2-Interval Pattern Matching Problems and Its Application to ncRNA Scanning (2009) (0)
- Grouping-Enabled and Privacy-Enhancing Communications Schemes for VANETs (2011) (0)
- LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation) (2016) (0)
- Title Adjacent nucleotide dependence in ncRNA and order-1 SCFG forncRNA identification (2010) (0)
- An Experimental Study of Compressed Indexing and Local Alignments of DNA (2007) (0)
- Title MetaCluster : unsupervised binning of environmental genomicfragments and taxonomic annotation (2010) (0)
- rMFilter: acceleration of long read‐based structure variation calling by chimeric read filtering (2017) (0)
- Title PERGA : A Paired-End Read Guided De Novo Assembler forExtending Contigs Using SVM and Look Ahead Approach (2014) (0)
- Practical fully leakage resilient signatures with auxiliary inputs (2022) (0)
- UFLE: a user-friendly location-free encryption system for mobile users (2014) (0)
- Hash Proof System with Auxiliary Inputs and Its Application (2022) (0)
- Title Maintaining hard disk integrity with digital legal professionalprivilege ( LPP ) data (2013) (0)
- Title Towards a better similarity measure for keyword profiling viaclustering (2013) (0)
- k-Dimensional hashing scheme for hard disk integrity verification in computer forensics (2011) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Siu-ming. Yiu?
Siu-ming. Yiu is affiliated with the following schools: