UM

Browse/Search Results:  1-10 of 15 Help

Selected(0)Clear Items/Page:    Sort:
Andrographolide derivative as STAT3 inhibitor that protects acute liver damage in mice Journal article
BIOORGANIC & MEDICINAL CHEMISTRY, 2018,Volume: 26,Issue: 18,Page: 5053-5061
Authors:  Chen, Shao-Ru;  Li, Feng;  Ding, Mo-Yu;  Wang, Decai;  Zhao, Qi;  Wang, Yitao;  Zhou, Guo-Chun;  Wang, Ying
View  |  Adobe PDF(2009Kb)  |  Favorite  |  View/Download:835/69  |  Submit date:2018/10/30
Andrographolide  Stat3 Inhibitor  Acute Liver Damage  Inflammation  
Locating splicing forgery by fully convolutional networks and conditional random field Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 66,Page: 103-112
Authors:  Liu, Bo;  Pun, Chi-Man
Favorite  |  View/Download:23/0  |  Submit date:2018/10/30
Splicing Forgery  Deep Neural Network  Fully Convolutional Network  Conditional Random Field  
A DCT-based information hiding method for network authentication Conference paper
ACM International Conference Proceeding Series
Authors:  Song W.;  Zou S.;  Tian Y.;  Li C.;  Sun S.;  Fong S.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Discrete cosine transform  Image processing  Information hiding  Network authentication  
Facial feature based secure information transmission Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Wang Y.;  Fong S.;  Duan C.;  Song W.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/13
Biometric cryptosystems  Gabor features  Secret key generation  
Elemental analysis of Chinese black inks on xuan paper by ArF laser-excited plume fluorescence Journal article
Analytical Chemistry, 2016,Volume: 88,Issue: 22,Page: 10971-10978
Authors:  Cai Y.;  Huang Z.;  Cheung M.H.C.;  Motto-Ros V.;  Chu P.-C.;  Wang Y.;  Zhong H.;  Yuen R.;  Leung K.S.Y.;  Lum J.T.S.;  Ho S.-K.;  Cheung N.-H.
Favorite  |  View/Download:3/0  |  Submit date:2019/03/01
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems Journal article
IEEE Transactions on Computers, 2015,Volume: 64,Issue: 1,Page: 4
Authors:  Yang X.;  Lin J.;  Yu W.;  Moulema P.-M.;  Fu X.;  Zhao W.
Favorite  |  View/Download:6/0  |  Submit date:2018/10/30
and polynomial-based en-route filtering  Cyber-physical networked system  data injection attack  sensor networks  
A biometric authentication model using hand gesture images Journal article
BioMedical Engineering Online, 2013,Volume: 12,Issue: 1
Authors:  Simon Fong;  Yan Zhuang;  Iztok Fister;  Iztok Fister Jr
Favorite  |  View/Download:7/0  |  Submit date:2019/02/13
Biometric Authentication  Hand Gesture  Hand Sign Recognition  Machine Learning  
Internet of things' authentication and access control Journal article
International Journal of Security and Networks, 2012,Volume: 7,Issue: 4,Page: 228-241
Authors:  Liu J.;  Xiao Y.;  Chen C.L.P.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/11
Access control  Authentication  IoT  RFID  Security  
Designing an efficient and secure credit cardbased payment system with web services based on the ANSI X9.59-2006 Journal article
Journal of Information Processing Systems, 2012,Volume: 8,Issue: 3,Page: 495-520
Authors:  Chi Po Cheong;  Simon Fong;  Pouwan Lei;  Chris Chatwin;  Rupert Young
Favorite  |  View/Download:13/0  |  Submit date:2019/02/13
Electronic Commerce  Payment Protocols  Set  Web Services  X9.59  
Anonymous authentication based on mobile roaming network Journal article
Advanced Science Letters, 2012,Volume: 7,Page: 95-97
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/11
Anonymous authentication  Group signature  Roaming network  Wireless communication