UM

Browse/Search Results:  1-10 of 30 Help

Selected(0)Clear Items/Page:    Sort:
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators Journal article
IEEE TRANSACTIONS ON CYBERNETICS, 2018,Volume: 48,Issue: 12,Page: 3349-3358
Authors:  Zhang, Tong;  Chen, C. L. Philip;  Chen, Long;  Xu, Xiangmin;  Hu, Bin
Favorite | View/Download:10/0 | TC[WOS]:43 TC[Scopus]:0 | Submit date:2019/01/17
Boolean function  I-Ching  I-Ching operators 23 (ICOs)  periodic iterated function (PIF)  substitution box (S-Box)  
Uncertain Data Clustering in Distributed Peer-to-Peer Networks Journal article
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018,Volume: 29,Issue: 6,Page: 2392-2406
Authors:  Zhou, Jin;  Chen, Long;  Chen, C. L. Philip;  Wang, Yingxu;  Li, Han-Xiong
Favorite | View/Download:37/0 | TC[WOS]:6 TC[Scopus]:0 | Submit date:2018/10/30
Attribute Weight Entropy  Distributed Clustering  Peer-to-peer (P2p) Networks  Uncertain Data  
On the strategy and behavior of bitcoin mining with N-attackers Conference paper
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
Authors:  Liu H.;  Du R.;  Ruan N.;  Jia W.
Favorite | View/Download:11/0 | TC[WOS]:5 TC[Scopus]:0 | Submit date:2019/04/04
Bitcoin  Mining  N-attackers  Selfish mining  
A tradeoff between the losses caused by computer viruses and the risk of the manpower shortage Journal article
PLOS ONE, 2018,Volume: 13,Issue: 1
Authors:  Bi, Jichao;  Yang, Lu-Xing;  Yang, Xiaofan;  Wu, Yingbo;  Tang, Yuan Yan
Favorite | View/Download:21/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/10/30
Image Splicing Localization via Semi-Global Network and Fully Connected Conditional Random Fields Conference paper
Proceedings of European Conference on Computer Vision (ECCV) Workshops, 2018., Munich, Germany, 2018-9-8
Authors:  Xiaodong Cun;  Chi-Man Pun
Favorite | View/Download:11/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/05/21
Image Splicing Localization  Image Forgery Localization  Multimedia Security  
Optimized and Frequent Subgraphs: How Are They Related? Journal article
IEEE ACCESS, 2018,Volume: 6,Page: 37237-37249
Authors:  Rehman, Saif Ur;  Asghar, Sohail;  Fong, Simon James
Favorite | View/Download:18/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/10/30
Data mining  graph pattern mining  social network analysis  frequent subgraph patterns  optimized graph patterns  
Facial feature based secure information transmission Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Wang Y.;  Fong S.;  Duan C.;  Song W.
Favorite | View/Download:4/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Biometric cryptosystems  Gabor features  Secret key generation  
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT Conference paper
ACM International Conference Proceeding Series
Authors:  Wu Y.;  Fong S.;  Zhuang Y.
Favorite | View/Download:6/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Computer network security  Security threats  SME  
Big data mining algorithms for fog computing Conference paper
ACM International Conference Proceeding Series
Authors:  Fong S.
Favorite | View/Download:7/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2019/02/13
Computer network security  Security threats  SME  
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications Journal article
IEEE INTERNET OF THINGS JOURNAL, 2017,Volume: 4,Issue: 5,Page: 1125-1142
Authors:  Lin, Jie;  Yu, Wei;  Zhang, Nan;  Yang, Xinyu;  Zhang, Hanlin;  Zhao, Wei
Favorite | View/Download:39/0 | TC[WOS]:461 TC[Scopus]:0 | Submit date:2018/10/30
Applications  enabling technologies  fog/edge computing  Internet of Things (IoT)  security and privacy