Detection of Image Region Duplication Using Spin Image
SONG, Xianhua, WANG, Shen, YIU, Siuming, JIANG, Lin, NIU, Xiamu
Published in IEICE Transactions on Information and Systems (2013)
Published in IEICE Transactions on Information and Systems (2013)
Get full text
Journal Article
Chameleon Hash Based Efficiently Updatable Oblivious Key Management
Wang, Zhiwei, Lan, Longwen, Yiu, Siuming
Published in IEEE transactions on services computing (01.11.2023)
Published in IEEE transactions on services computing (01.11.2023)
Get full text
Journal Article
Online/offline and History Indexing Identity-based Fuzzy Message Detection
Wang, Zhiwei, Liu, Feng, Yiu, Siuming, Lan, Longwen
Published in IEEE transactions on information forensics and security (01.01.2023)
Published in IEEE transactions on information forensics and security (01.01.2023)
Get full text
Journal Article
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
Chen, Wenbin, Li, Jin, Huang, Zhengan, Gao, Chongzhi, Yiu, Siuming, Jiang, Zoe L.
Published in Journal of computer and system sciences (01.09.2021)
Published in Journal of computer and system sciences (01.09.2021)
Get full text
Journal Article
Privacy-preserving edge-assisted image retrieval and classification in IoT
LI, Xuan, LI, Jin, YIU, Siuming, GAO, Chongzhi, XIONG, Jinbo
Published in Frontiers of Computer Science (01.10.2019)
Published in Frontiers of Computer Science (01.10.2019)
Get full text
Journal Article
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
Zhang, En, Duan, Xintao, Yiu, Siuming, Fang, Junbin, Jiang, Zoe L, HonYuen, Tsz, Peng, Jie
Published in Computers, materials & continua (2018)
Published in Computers, materials & continua (2018)
Get full text
Journal Article
An ORAM Scheme with Improved Worst-Case Computational Overhead
Cao, Nairen, Yu, Xiaoqi, Yang, Yufang, Zhang, Linru, Yiu, SiuMing
Published in Information and Communications Security (05.03.2016)
Published in Information and Communications Security (05.03.2016)
Get full text
Book Chapter
Graph Augmentation for Recommendation
Zhang, Qianru, Xia, Lianghao, Cai, Xuheng, Yiu, Siuming, Huang, Chao, Jensen, Christian S
Year of Publication 25.03.2024
Year of Publication 25.03.2024
Get full text
Journal Article
Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation
Zhang, Qianru, Huang, Chao, Xia, Lianghao, Wang, Zheng, Yiu, Siuming, Han, Ruihua
Year of Publication 18.06.2023
Year of Publication 18.06.2023
Get full text
Journal Article
Automated Spatio-Temporal Graph Contrastive Learning
Zhang, Qianru, Huang, Chao, Xia, Lianghao, Wang, Zheng, Li, Zhonghang, Yiu, Siuming
Published in arXiv.org (06.05.2023)
Published in arXiv.org (06.05.2023)
Get full text
Paper
Journal Article
Forensic Analyses Based on Predictive Coding
Hou, Shuhi, Dong, Shanshan, Yiu, Siuming, Uehara, Tetsutaro
Published in 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS) (01.07.2020)
Published in 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS) (01.07.2020)
Get full text
Conference Proceeding
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics
Jiang, Zoe Lin, Fang, Jun-bin, Hui, Lucas Chi Kwong, Yiu, SiuMing, Chow, Kam Pui, Sheng, Meng-meng
Published in Frontiers of information technology & electronic engineering (01.10.2011)
Published in Frontiers of information technology & electronic engineering (01.10.2011)
Get full text
Journal Article
Graph Augmentation for Recommendation
Zhang, Qianru, Xia, Lianghao, Cai, Xuheng, Yiu, Siuming, Huang, Chao, Jensen, Christian S
Published in arXiv.org (25.03.2024)
Get full text
Published in arXiv.org (25.03.2024)
Paper
Spatial-Temporal Graph Learning with Adversarial Contrastive Adaptation
Zhang, Qianru, Huang, Chao, Xia, Lianghao, Wang, Zheng, Yiu, Siuming, Han, Ruihua
Published in arXiv.org (19.06.2023)
Get full text
Published in arXiv.org (19.06.2023)
Paper
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics
Chen, Qian, Hui, Lucas C.K., Liu, Dong, Zhang, En, Liao, Qing, Jiang, Zoe L., Fang, Junbin, Yiu, Siuming, Xi, Guikai, Li, Rong, Yi, Zhengzhong, Wang, Xuan
Published in 2018 IEEE Security and Privacy Workshops (SPW) (01.05.2018)
Published in 2018 IEEE Security and Privacy Workshops (SPW) (01.05.2018)
Get full text
Conference Proceeding