Co-Authors
AuthorsNo. of Publications
yiu, sm 47
hui, lck 36
chong, cf 25
tsang, ww 22
chan, hw 21
hui, ck 16
lai, pky 15
pun, kh 13
chung, rhy 12
kwan, myk 12
law, fyw 10
chow, ssm 8
fang, j 7
jiang, zl 7
chin, fyl 6
ieong, rsc 6
kwan, yk 6
luo, t 6
wong, kyk 6
yuk, sc 6
ieong, r 5
lai, ky 5
lai, p 5
tang, y 5
tse, hks 5
wong, kky 5
xu, f 5
yang, m 5
yau, kk 5
chan, psv 4
chan, vps 4
he, x 4
hui, l 4
kwan, m 4
law, yw 4
overill, re 4
tse, h 4
wang, x 4
chan, km 3
chan, rcb 3
chen, l 3
fan, x 3
fang, jb 3
law, f 3
niu, x 3
silomon, jam 3
tse, kwh 3
wang, m 3
yau, kkk 3
yuk, jsc 3
chan, eyk 2
chan, pf 2
chanson, st 2
chen, z 2
chung, hy 2
gong, y 2
han, q 2
he, mf 2
he, xc 2
hon, wk 2
hou, s 2
hou, sh 2
hui, akt 2
ieong, scr 2
ip, sk 2
jiang, l 2
lai, ym 2
lam, tw 2
lau, wc 2
li, z 2
li, zc 2
overill, r 2
shen, a 2
silomon, j 2
sui, af 2
tan, z 2
tang, b 2
ting, hf 2
tsang, ksh 2
tse, ksh 2
tse, whk 2
tso, cw 2
uehara, t 2
wang, t 2
wu, x 2
yang, y 2
yeung, dy 2
yu, ky 2
zhang, p 2
zheng, x 2
zhou, g 2
zhu, d 2
berry, daniel m 1
cao, w 1
chan, cb 1
chan, cf 1
chan, h 1
chan, p 1
chan, ps 1
chan, yk 1
chau, py 1
chen, j 1
chen, xj 1
cheng, ky 1
cheng, q 1
cheung, asy 1
cheung, b. 1
cheung, bsn 1
cheung, ls 1
cheung, mh 1
cheung, mmh 1
cheung, sn 1
cotton, jw 1
fan, xx 1
feng, b 1
fong, g 1
fung, hsk 1
he, j 1
he, y 1
hong, p 1
hui, m 1
hung, ct 1
hung, hf 1
im, swk 1
ip, chokho 1
ju, w 1
lam, ck 1
lam, lck 1
lee, ck 1
lee, kh 1
li, f 1
li, fkf 1
li, n 1
li, q 1
li, y 1
liang, y 1
liu, m 1
lu, k 1
lu, z 1
lui, rwc 1
ma, sk 1
mai, yh 1
man, ly 1
peng, b 1
perett, m 1
pun, kkh 1
qin, j 1
qin, s 1
rashed, m 1
shao, w 1
sheng, mm 1
shenoi, s 1
shi, jq 1
tang, j 1
tsang, ayf 1
tsang, yf 1
tseung, cy 1
tso, scw 1
tu, w 1
wang, c 1
wang, ek 1
weber, rh 1
woo, y 1
wu, qy 1
xu, j 1
xu, r 1
xu, rs 1
xu, x 1
ye, y 1
ye, ym 1
yeung, p 1
yin, w 1
yiu, s 1
yong, amk 1
yong, mk 1
yung, nhc 1
zhang, x 1
zhu, q 1
View More
Keywords in Publications
keywordsNo. of Authors
distributed denial-of-service (ddos) 7
intrusion detection 7
routers 7
testbed 7
cryptography 6
boundary smoothness 5
cryptanalysis 5
de-interlacing methods 5
edge dependent interpolation 5
group signature 5
hard disk integrity 5
merging criterion 5
motion adaptive interpolation 5
optimal number of segments 5
watershed segmentation 5
3-dimension hashing 4
bloom filter 4
computer forensics 4
computer networks 4
contour measurement 4
database operation 4
database systems 4
decentralized control 4
digital arithmetic 4
digital forensic engineering 4
edge detection 4
electronic crime countermeasures 4
forensic analysis 4
homomorphic encryption 4
indexing (of information) 4
latent sector errors (lses) 4
legal professional privilege (lpp) 4
multiparty matching 4
object-based retrieval system 4
privacy 4
probabilistic logics 4
real time systems 4
sensor networks 4
systematic approaches 4
text-based matching 4
actuation 3
applied cryptography 3
bilinear pairings 3
bitcoin simulation model 3
bittorrent model 3
blind signature 3
chinese information processing 3
chinese shanzhai phones 3
chinese word extraction 3
cloud forensics 3
cloudfront 3
combinatorial group testing (cgt) 3
commutative encryption 3
computing technology 3
confidential forensic investigation 3
context-aware 3
cryptographic primitives 3
cyber-physical system 3
datamining 3
deblurring 3
deleted data 3
digital crimes 3
digital evidence 3
dual cube 3
e-lottery 3
elliptic curve cryptosystems 3
error rates 3
face model 3
face reconstruction 3
file carving 3
file sharing 3
firewalls 3
forensic investigation 3
forensics technology 3
forward security 3
forward-secure signature 3
goodness measure 3
hard disk sector allocation 3
heuristic-based address clustering 3
hierarchical identity-based signature 3
identity-based partially blind signature 3
identity-based signcryption 3
initial seeders 3
integrity verification 3
internet forum 3
internet piracy 3
internet surveillance 3
k-dimensional hashing 3
keyword clustering 3
live forensics 3
mediatek 3
memory analysis 3
motion estimation 3
multisignature 3
network security 3
peer to peer 3
phonebook 3
photo forensics 3
pose estimation 3
privacy preserving forensics 3
privacy-preserving multiple keyword search 3
provable security 3
public ciphertext authenticity 3
public key cryptosystems 3
public verifiability 3
remote forensics 3
search on encrypted data 3
security 3
self-defense 3
semantical security 3
sensitivity analysis 3
shanzhai mobile phone 3
similarity measure 3
spatially varing blur kernels 3
super-resolution 3
tamper proofing 3
texture mapping 3
threshold partially blind signature 3
tracking 3
user profiling 3
verifiable random function 3
virus detection 3
volatile data 3
web crawler 3
audio 2
bag-of-gait 2
binding corporate rules 2
biometric 2
block cipher 2
cast-128 2
color similarity 2
computer programming 2
computers 2
data controllers and data processors 2
data privacy 2
data protection 2
data security 2
differential cryptanalysis 2
digital forensics 2
digital investigation 2
forensics 2
foxmail 2
fragmentation point 2
fragmented jpeg file 2
gait recognition 2
graph cuts optimization 2
human identification 2
incident response 2
industrial control systems 2
instant message 2
internet applications 2
jpeg file carving 2
logging system 2
machine learning 2
motion vectors consistency 2
msn 2
object silhouette segmentation 2
one-class svm 2
programmable logic controllers 2
programming logic controller 2
protection of personaldata 2
qq 2
smartphone 2
software computers 2
temporal aligned selection 2
trans-border data transfer 2
video stitching 2
video surveillance 2
voice chat 2
water treatment system 2
weak key 2
006.35 c52 1
495.13028 c5 1
analysis 1
animals 1
bayesian network 1
bayesian networks 1
bayesian posterior probability 1
behavior analysis 1
behavioral characteristics 1
bittorrent file sharing 1
business model 1
chinese language -- dictionaries. 1
civil unrest 1
cloud storage ecosystem 1
competing hypotheses 1
computer crime 1
computer crimes - prevention. 1
computer crimes. 1
computer model 1
computer security. 1
computer technology 1
control systems 1
covid-19 sensing 1
criminal profiling 1
cross infection - transmission 1
cyber attacks 1
cyberlocker 1
cyberlockers 1
cybersecurity 1
data mining 1
ddos 1
ddos attacks 1
digital forensic hypotheses 1
digital forensic investigation 1
discussion forums 1
disinfection 1
electronic evidence 1
elevator control 1
evidential probability 1
evidentiary reasoning 1
fat 1
feature selection 1
file system analysis 1
first seeder 1
flash mob organizers 1
forensic perspective 1
forensic sciences. 1
forensics tools 1
foxy 1
foxy network 1
gnutella 2 protocol 1
green dam youth escort 1
humans 1
hypotheses 1
identity tracking 1
infant 1
information extraction 1
information retrieval 1
initial seeder 1
international standards 1
internet auction fraud 1
internet crimes 1
internet pirates 1
investigation model 1
knowledge extraction 1
knowledge graph 1
knowledge graph reasoning 1
ladder logic programming 1
learning (artificial intelligence) 1
light-weight ddos solution 1
memory acquisition 1
memory forensics 1
mice 1
mitigation 1
mobile telephone 1
multilayer perceptrons 1
named entity recognition 1
natural language processing 1
natural language processing (computer science) 1
network simulation 1
occupy central campaign 1
odds 1
operational complexity model 1
packet filtering 1
packet profiling 1
peer-to-peer network forensics 1
peer-to-peer networks 1
piracy 1
plc forensics 1
political events 1
possession of child pornography 1
predictive modeling 1
privacy preservation 1
privacy protection 1
probability 1
probability theory 1
public health 1
quantification of plausibility 1
real-name registration 1
reasoning 1
rectum 1
relation extraction 1
relevance of evidence 1
salmonella infections - transmission 1
scada security 1
science and law 1
sentiment classification 1
social media in china 1
social media platform 1
storage media 1
taxonomy 1
thermometers 1
threats 1
time analysis 1
vulnerability 1
yahoo! case 1
View More