Co-Authors
AuthorsNo. of Publications
hui, lck 91
lam, tw 61
chow, kp 46
chin, fyl 38
leung, hcm 35
li, vok 28
hui, ck 27
sung, wk 26
chim, tw 25
chow, ssm 21
wong, tkf 20
jiang, zl 18
cheung, dwl 16
fang, j 14
ting, hf 14
li, r 12
wang, y 12
hon, wk 11
peng, y 11
yuen, th 11
chong, cf 10
dong, y 10
tsang, ww 10
cheung, dw 9
li, y 9
mamoulis, n 9
wang, j 9
chan, hw 8
liu, b 8
liu, x 8
pun, kh 8
zhang, y 8
lai, pky 7
lui, rwc 7
wong, pwh 7
xiong, h 7
ye, y 7
yu, c 7
chan, hl 6
he, y 6
leung, ws 6
lin, mc 6
liu, cm 6
luo, r 6
sadakane, k 6
sui, af 6
wang, x 6
wong, t 6
zhang, j 6
chan, pf 5
chan, py 5
cui, x 5
fang, jb 5
go, hw 5
kung, hf 5
li, j 5
li, z 5
lian, w 5
smith, dk 5
tang, y 5
wang, ek 5
yang, b 5
zhang, c 5
chan, ppf 4
chen, j 4
chen, y 4
cheung, bwy 4
huang, h 4
hui, l 4
jia, y 4
jiang, l 4
lim, bl 4
liu, z 4
niu, x 4
siu, mh 4
tam, sl 4
wang, l 4
wong, kf 4
wong, wk 4
yau, kk 4
yu, ky 4
zhu, x 4
cheung, b 3
cheung, bsn 3
han, q 3
he, yj 3
hou, sh 3
huang, s 3
jiang, z 3
kwan, myk 3
law, fyw 3
lei, p 3
leung, sy 3
shen, z 3
shi, j-y 3
shi, jy 3
shi, y 3
sun, y 3
sung, kwk 3
tsang, yh 3
uehara, t 3
wang, b 3
wong, ck 3
woo, y 3
yang, d 3
yang, w 3
yau, jck 3
yeung, cy 3
zhan, q 3
zhang, h 3
zhang, p 3
au, man ho 2
au, mh 2
chan, tf 2
chen, l 2
chen, z 2
cheng, s 2
cheung, jcl 2
chiu, ys 2
chow, sm 2
dong, k 2
he, m 2
he, mf 2
he, z 2
ho, ws 2
hou, s 2
hsu, by 2
huang, q 2
huang, y 2
huang, z 2
ieong, r 2
ieong, rsc 2
jansson, j 2
kao, my 2
kristiansen, k 2
lai, ym 2
lam, tak wah 2
lee, lk 2
leung, cm 2
li, b 2
li, d 2
li, j-x 2
li, jx 2
li, p 2
li, q 2
li, rq 2
li, yingrui 2
liang, c 2
liang, y 2
liu, binghang 2
lu, n 2
lui, wc 2
luo, ruibang 2
mao, k-t 2
niu, xm 2
peng, s 2
qin, j 2
qing, s 2
quan, g 2
rosenfeld, r 2
song, y 2
song, yq 2
tam, a 2
tan, z 2
tang, b 2
wang, m 2
wang, yd 2
wijaya, e 2
wong, ds 2
wong, shy 2
wu, e 2
wu, e 2
xiang, cl 2
xiang, q 2
xie, y 2
xu, x 2
yang, h 2
yao, h 2
ye, ym 2
yu, h 2
yuan, j 2
zhang, ep 2
zhang, q 2
zhang, yn 2
zheng, x 2
zhou, b 2
zhou, g 2
zhu, j 2
an, n 1
bai, f 1
bai, y 1
bolund, l 1
bond, cs 1
bruford, mw 1
cai, j 1
cai, q 1
cai, yp 1
cao, j 1
cao, j-b 1
cao, jb 1
castleden, i 1
cbow, ssm 1
chan, cf 1
chan, dtf 1
chan, eyk 1
chan, ft 1
chan, km 1
chan, kp 1
chan, p 1
chan, pck 1
chan, ps 1
chang, ky 1
chanson, st 1
che, cm 1
chen, jc 1
chen, k 1
chen, ty 1
chen, yanxiang 1
chen, yuechen 1
cheng, ky 1
cheng, m 1
cheng, yb 1
cheung, david w. 1
cheung, ls 1
cheung, mh 1
cheung, vls 1
cheung, yt 1
chim, tw 1
chin, fy 1
ching, whm 1
choi, ako 1
choi, sw 1
chu, x 1
chu, xw 1
chung, k 1
cook, k 1
cui, y 1
dong, d 1
fan, w 1
fan, x 1
fang, l 1
fang, x 1
feng, b 1
fisher, mf 1
fu, y 1
gao, c 1
gao, cz 1
gao, k 1
gong, t 1
gu, w 1
guo, x 1
guo, y 1
gutmann, b 1
han, c 1
han, changlei 1
he, g 1
he, guangzhu 1
he, l 1
he, zq 1
ho, ws 1
hobbs, n 1
hon, w 1
hou, r 1
hu, c 1
hu, w 1
hu, xh 1
hu, y 1
huang, j 1
huang, w 1
huang, weihua 1
huang, x 1
hui, akt 1
hui, lucas ck 1
ieong, s 1
ip, sk 1
jian, m 1
jiang, t 1
jiang, y 1
jiang, zoe l. 1
ju, w 1
kanagasabai, r 1
kao, bcm 1
kao, cm 1
kosiol, c 1
kuzuno, hiroki 1
kwan, m 1
kwan, yk 1
kwok, ck 1
kwok, lk 1
lai, l 1
lai, p 1
lam, ck 1
lam, hm 1
lam, ky 1
lam, tty 1
lau, kw 1
lau, skp 1
lau, tck 1
lau, wc 1
lau, yl 1
law, f 1
law, wc 1
law, yw 1
lee, hh 1
lee, j 1
lee, jkw 1
lee, sd 1
leung, fcc 1
leung, hc 1
leung, k 1
leung, karl rph 1
li, ccd 1
li, dinghua 1
li, ehm 1
li, eky 1
li, g 1
li, h 1
li, hy 1
li, jy 1
li, l 1
li, m 1
li, n 1
li, s 1
li, t 1
li, wl 1
li, x 1
li, xq 1
li, yp 1
li, zh 1
li, zhenyu 1
liang, h 1
liao, x 1
liao, xiangke 1
lin, h 1
lin, m 1
lin, mcm 1
lin, r 1
lin, s 1
liu, chi man 1
liu, g 1
liu, guangming 1
liu, h 1
liu, jk 1
liu, joseph k. 1
liu, q 1
liu, s 1
liu, w 1
liu, y 1
liu, yong 1
liu, yunjie 1
liu, zc 1
lo, e 1
lu, h-m 1
lu, y 1
lu, yao 1
lu, z 1
lu, zj 1
lum, ct 1
luo, b 1
luo, rb 1
luo, y 1
lv, mj 1
ma, ccc 1
ma, l 1
mai, yh 1
man, ly 1
mao, kt 1
meng, xx 1
min, j 1
mu, b 1
mui, tw 1
mui, yc 1
mui, z 1
ng, p 1
ng, sm 1
ni, p 1
nie, w 1
nielsen, r 1
olson, m 1
pan, q 1
pan, qi 1
parkinson, j 1
peng, shaoliang 1
peng, z 1
peng, zy 1
qian, w 1
qin, h 1
qin, jj 1
qin, n 1
qu, n 1
rajaraman, k 1
ren, k 1
ren, x 1
ren, y 1
ruan, j 1
ryder, oa 1
sasaki, r 1
shan, g 1
shen, f 1
sheng, mm 1
shi, j 1
shi, yujian 1
shi, z 1
siu, wy 1
small, i 1
smith, d 1
son, nt 1
song, b 1
song, xh 1
song, y 1
steiner, cc 1
sun, rwy 1
sun, x 1
susilo, w 1
tang, cy 1
tang, j 1
tang, jingbo 1
tang, ricky wm 1
tian, f 1
tian, g 1
tian, j 1
tian, z 1
ting, hing fung 1
tsang, kl 1
tsang, yf 1
tse, hks 1
tse, wl 1
tso, cw 1
tu, w 1
vinar, t 1
vu, h 1
wan, kl 1
wang, ayx 1
wang, bo 1
wang, bq 1
wang, g 1
wang, h 1
wang, jian 1
wang, jun 1
wang, jy 1
wang, k 1
wang, s 1
wang, w 1
wang, wp 1
wang, xm 1
wang, xuan 1
wei, f 1
wen, m 1
wong, fl 1
wong, gks 1
wong, s 1
wong, sck 1
wong, wh 1
woo, pcy 1
wu, emk 1
wu, g 1
wu, gengxiong 1
wu, j 1
wu, q 1
wu, qy 1
wu, x 1
wu, xy 1
wu, z 1
xiaoqian, zhu 1
xie, x 1
xie, yinlong 1
xie, z 1
xiong, j 1
xu, a 1
xu, f 1
xu, j 1
xu, l 1
xu, rs 1
xuan, z 1
xue, cj 1
yang, g 1
yang, huanming 1
yang, j 1
yang, m 1
yang, z 1
yao, l 1
yau, ckj 1
ye, c 1
yeung, dy 1
yim, a 1
yim, tch 1
yip, ky 1
yip, mcl 1
yiu, sw 1
yu, chang 1
yu, d 1
yu, j 1
yuan, jianying 1
zeng, g 1
zeng, gongxian 1
zeng, t 1
zhang, d 1
zhang, g 1
zhang, hao 1
zhang, hl 1
zhang, jun 1
zhang, l 1
zhang, w 1
zhang, wq 1
zhang, x 1
zhang, y-n 1
zhang, z 1
zhao, j 1
zhao, k 1
zhao, ky 1
zhao, m 1
zhao, s 1
zheng, h 1
zheng, y 1
zhong, j 1
zhong, x 1
zhou, y 1
zhu, h 1
zhu, w 1
zhu, xg 1
zoe, j 1
View More
Keywords in Publications
keywordsNo. of Authors
algorithms 13
animals 8
genome 8
humans 8
privacy 8
sequence analysis, dna 8
sequence analysis, protein - methods 8
distributed denial-of-service (ddos) 7
intrusion detection 7
routers 7
sequence analysis, dna - methods 7
testbed 7
artificial intelligence 6
base sequence 6
blind signature 6
bloom filter 6
computational biology - methods 6
models, chemical 6
molecular sequence data 6
security 6
sequence alignment 6
software 6
alternative splicing 5
anonymous credential 5
authentication 5
bilinear pairings 5
binding energy 5
binning 5
cluster analysis 5
combinatorial group testing 5
commutative encryption 5
computer simulation 5
conserved sequence - genetics 5
dna microarray 5
evolution, molecular 5
homomorphic encryption 5
mice 5
motif finding 5
phylogeny 5
protein interaction mapping - methods 5
proteins - chemistry - metabolism 5
secure vehicular sensor network 5
transcription factor 5
vehicular ad hoc network 5
access policies 4
amino acid motifs 4
anonymous routing 4
assembly 4
authenticatiion 4
batch verification 4
batch vertification 4
binding sites 4
china 4
chromosome mapping - methods 4
complex structure 4
computational tools 4
computer forensics 4
computer networks 4
contig 4
contig mapping 4
data mining 4
data-base servers 4
database 4
database operation 4
database records 4
databases, genetic 4
decision tree 4
diet - veterinary 4
digital arithmetic 4
digital forensic engineering 4
dna - chemistry 4
dogs 4
electric vehicle 4
electronic crime countermeasures 4
error correction 4
event data recorder 4
fake route 4
female 4
fertility - genetics - physiology 4
forward security 4
gap-filling 4
genetic disease 4
genome - genetics 4
genome, human 4
genomics 4
group communication 4
group communications 4
hard disk integrity 4
heterozygote 4
hmac 4
human chromosomes 4
human genomes 4
low coverage 4
manets 4
message classification 4
metrics 4
models, statistical 4
multigene family - genetics 4
multiparty matching 4
multipath 4
oblivious transfer 4
oblivious transfer (ot) 4
online catalog 4
polymorphism, single nucleotide - genetics 4
privacy preservation 4
privacy preserving 4
privacy-preserving 4
protein binding 4
proteins - chemistry 4
proxy re-encryption 4
pseudo identity 4
pseudoidentity 4
public-key infrastructure 4
querying service 4
reads alignments 4
receptors, g-protein-coupled - genetics 4
scaffold 4
segmental duplications 4
sensor networks 4
smart grid network 4
snp calling 4
structural variations 4
symmetric cryptography 4
synteny - genetics 4
systematic approaches 4
tamper-resistant device 4
technical speaking 4
the standard model 4
transcription factors - chemistry 4
tree optimization 4
ursidae - classification - genetics - physiology 4
vehicular sensor network 4
verification 4
3-dimension hashing 3
5' untranslated regions - genetics 3
accurate 3
actuation 3
adaptive phentype testing 3
alarm systems 3
alternative splicing - genetics 3
alternative splicing pattern 3
amino acid sequence 3
anonymous authentication 3
anonymous fuzzy ibe 3
applied cryptography 3
article 3
attractive solutions 3
auxiliary inputs 3
biological evolution 3
bittorrent model 3
building block 3
bwt 3
carrier proteins - genetics 3
certificate revocation 3
chinese shanzhai phones 3
cloud forensics 3
cloudfront 3
cluster-based architecture 3
clustering 3
combinatorial group testing (cgt) 3
comparative genomics 3
computation efficiency 3
computational predction 3
computer program 3
computer-aided design 3
computing technology 3
confidential forensic investigation 3
conserved gene pairs 3
conserved genes 3
conserved sequence 3
conseved metabolic pathways 3
context-aware 3
cryptographic primitives 3
cryptographic techniques 3
cryptography 3
cyber-physical system 3
data mining - methods 3
datamining 3
de bruijn graph 3
de novo assembly 3
de novo transcriptome assembly 3
delegation 3
deleted data 3
digital crimes 3
digital evidence 3
digital forensics 3
distributed ca services 3
dna composition features 3
dna mutational analysis - methods 3
dna sequence 3
dna, complementary - genetics 3
document indexing 3
e-lottery 3
efficiency improvement 3
efficient protocols 3
elliptic curve cryptosystems 3
environmental genomics 3
environmental microbiology 3
escherichia coli - classification - genetics - isolation and purification 3
escherichia coli - genetics 3
ests 3
exons 3
exons - genetics 3
experimental studies 3
experimentation 3
expressed sequence tags 3
expressed sequences 3
false positive reactions 3
fast annotation 3
file carving 3
file sharing 3
firewalls 3
flooding 3
forensic analysis 3
forensic investigation 3
forensics technology 3
forward-secure signature 3
gene expression - genetics 3
gene expression regulation 3
generic construction 3
genome, bacterial 3
genome, bacterial - genetics 3
hard disk sector allocation 3
heterogeneous information 3
hierarchical identity-based cryptosystem 3
hierarchical identity-based signature 3
high throughput sequencing 3
high throughput short reads 3
human genome 3
hybrid security model 3
identity-based encryption 3
identity-based partially blind signature 3
identity-based signcryption 3
indexing data structure 3
initial seeders 3
inner-product encryption 3
integrity verification 3
internet forum 3
internet piracy 3
internet surveillance 3
introns - genetics 3
isoforms 3
k-dimensional hashing 3
k-mean clustering 3
key integrity 3
keyword clustering 3
knock-out study 3
knockout study 3
l-mer 3
lactobacillus - genetics 3
latent sector errors (lses) 3
legal professional privilege (lpp) 3
lightweight protocols 3
live forensics 3
machine-learning 3
markov chains 3
mate-pair 3
mathematics 3
measurement 3
mediatek 3
memory analysis 3
metabolic network 3
metagenomic data analysis 3
metagenomics 3
metagenomics - methods 3
mice, inbred c57bl 3
micrornas 3
micrornas - chemistry - genetics 3
mining methods and algorithms 3
mobile ad hoc network 3
mobile ad hoc network (manet) 3
models, biological 3
models, genetic 3
models, molecular 3
models, theoretical 3
modified chebychev distance 3
multiple alignment 3
multiprotein complexes - chemistry - metabolism 3
multisignature 3
mutation 3
mutations 3
network security 3
next-generation sequencing 3
non-adaptive complex group testing 3
np-complete 3
pattern recognition, automated - methods 3
peer data management systems 3
peer to peer 3
performance 3
performance evaluation 3
phonebook 3
photo forensics 3
phylogenetic conservation 3
phylogenetic tree reconstruction 3
pki 3
pooling design 3
predicate encryption 3
predictive value of tests 3
privacy preserving forensics 3
privacy-preserving multiple keyword search 3
proactive update 3
promoter regions, genetic 3
protein interaction mapping 3
protein linkage 3
protein structure, tertiary 3
proteins 3
provable security 3
public ciphertext authenticity 3
public key cryptosystems 3
public verifiability 3
quantitative trait loci - genetics 3
query processing 3
rats 3
reliability 3
remote forensics 3
reputation systems 3
rna - genetics 3
rna splice sites - genetics 3
rna-binding proteins - genetics 3
roads 3
search on encrypted data 3
secure multi-party computation 3
security management 3
security of data 3
self-defense 3
semantical security 3
semistructured data 3
sequence alignment - methods 3
sequence analysis, rna 3
service provider 3
shanzhai mobile phone 3
shifted transversal design 3
short read alignment 3
side channel attack 3
signcryption 3
signing key 3
similarity measure 3
string graph 3
structural comparisons 3
synteny 3
tamper proofing 3
third parties 3
threshold cryptography 3
threshold partially blind signature 3
threshold secret sharing 3
tracking 3
user profiling 3
vehicles 3
vehicular ad hoc networks 3
verifiable random function 3
virus detection 3
volatile data 3
web crawler 3
web organization 3
weighted average problem 3
whole genome alignment 3
xml 3
xml/xsl/rdf 3
zebrafish - genetics 3
access control 2
access right delegation 2
access rights 2
accountability 2
ad-hoc and sensor networks 2
ad-hoc network 2
adaptive random testing 2
affine gap 2
android 2
android security 2
anonymity 2
anti-censorship 2
application platforms 2
applications software 2
attributes 2
audio 2
base pairing 2
basic operation 2
bioinformatics 2
birthmark 2
capability leaks 2
cell cycle pathway construction 2
center of gravity constraint 2
chained threshold proxy signature with supervision 2
cloud computing 2
code theft detection 2
collision detection 2
compression 2
computational geometry 2
computer graphics 2
computer science 2
computer security 2
construcion 2
content providers 2
content sharing 2
control flow 2
control flow checking 2
copyright 2
cp-abe 2
data compression - methods 2
data flow checking 2
data leakage 2
data privacy 2
data protection 2
databases, protein 2
decryption outsourcing 2
delegation certificate 2
delegation network 2
dense regions 2
density measure 2
digital contents 2
digital credential 2
digital identity management 2
digital investigation 2
digital rights management technology 2
directed diffusion 2
disordered proteins 2
distance learning 2
distributed management 2
distributed platforms 2
dna - genetics 2
document management systems 2
drug-drug interaction 2
dual encryption system 2
duplication detection 2
dynamic programming 2
dynamic separation of duty 2
dynamic threshold public key encryption 2
efficiency 2
elements 2
elliptic curve 2
encrypted documents 2
event-oriented 2
evidence integrity 2
evolutionary rate 2
execution time 2
file system 2
forensics 2
forward secrecy 2
forward secure threshold signature 2
gene regulation 2
general access structure 2
genetic variation 2
genome, human - genetics 2
genomic sequence 2
group signature 2
hard disks 2
hash value 2
hash values 2
high-speed quantum key distribution 2
ibe 2
identity based cryptography 2
identity-based cryptography 2
identity-based signature 2
incident response 2
industrial control systems 2
information security 2
information systems security 2
instant message 2
integrity check 2
internet 2
internet censorship 2
interoperability 2
intracellular signaling peptides and proteins - chemistry - genetics - metabolism 2
java 2
java applet 2
javascript 2
k-dimension hashing 2
k-taa 2
key agreement 2
key integrity checking 2
key-exposure 2
leakage-resilience 2
leakage-resilient 2
learning organizations 2
level-2 neighbours 2
lineage specificity 2
linux kernel 2
local structural alignment 2
location free 2
logging system 2
machine learning 2
mapk pathway 2
mapk pathway construction 2
matrix factorization 2
memory efficient algorithm 2
memory requirements 2
mobile phone 2
mobile platform 2
multiplicative sharing 2
named data networking 2
nni distance 2
non-coding rna 2
non-repudiation 2
non-shared edge distance 2
noncoding rnas 2
nonlinear state estimation 2
novel tandem duplication detection 2
nucleic acid conformation 2
nucleotides - chemistry - genetics 2
one-class svm 2
online computing 2
open sources 2
outsourced computation 2
pairing 2
pathway construction 2
pattern mathching 2
phylogenetic tree 2
prediction 2
privilege escalation attack 2
programmable logic controllers 2
protein pathway 2
protein pathway construction 2
proxy server 2
proxy signature 2
pseudoknot 2
pseudoknots 2
public key encryption 2
public key infrastructure (pki) 2
quantitative association rules 2
quantum cryptography 2
quantum key distribution 2
r-sequences 2
random testing 2
randomised algorithm 2
randomness 2
real data sets 2
real spontaneity 2
regression 2
related-key attack 2
related-randomness attack 2
revocable anonymity 2
ring signature 2
rna - chemistry - genetics 2
rna, untranslated - chemistry - classification 2
rna, untranslated - chemistry - genetics 2
rna, untranslated - genetics 2
rna-seq 2
role activation 2
role based access control 2
runtimes 2
secondary structure 2
secure browsing 2
security mediator 2
selective dissemination of information 2
self-management and autonomic networks 2
sequence analysis, rna - methods 2
sequence assembly 2
sequences 2
shared documents 2
short reads 2
side effects 2
signal transduction 2
signal transduction pathway 2
signatures 2
smart grids 2
smart router 2
smartcard 2
smartphone 2
software birthmark 2
software protection 2
splice junction 2
spliced alignment 2
spontaneity 2
spontaneous anonymous group signature 2
static taint analysis 2
strong selective family 2
structural alignment 2
system biology 2
systems assurance 2
taint analysis 2
taint checking 2
text indexing 2
threshold proxy signature 2
threshold ring signature 2
threshold ring signatures 2
tissue specificity 2
unlinkability 2
user revocation 2
virtual reality 2
voice chat 2
water treatment system 2
wireless sensor networks 2
xpath 2
antibiotic resistance gene 1
attribute revocation 1
attribute-based encryption 1
balance theory 1
biomarker discovery 1
bitcoin 1
c4.5 decision tree 1
card database 1
chinese character embedding 1
chinese new word detection 1
chinese word boundary detection 1
community 1
compact private key 1
complex pseudoknot 1
consecutive vertex guard 1
cryptographic primitive 1
data confidentiality 1
discrete cosine transforms 1
drug combination 1
drug–drug interaction 1
edge guard 1
encrypted gene expression profiles 1
exclusion-intersection encryption 1
fortress problem 1
gall 1
genomic structural variation 1
heterogeneous features 1
image coding 1
image processing 1
internet of things 1
large universe 1
matrix completion 1
microbe-disease association 1
multiple authorities 1
multiple classifier system 1
multiple encryption keys 1
network community 1
nonnegative matrix factorization 1
oblivious ram 1
one-class classification 1
online/offline encryption 1
outsourcing decryption 1
pairings 1
partition oram 1
pattern recognition, automated 1
ppwap 1
privacy preserving data mining 1
privacy protection 1
privacy-preserving elastic net 1
private information retrieval 1
quantisation (signal) 1
regularization 1
regulatory elements, transcriptional 1
release-time confidentiality 1
rna 1
rna -- structure. 1
rna, untranslated - chemistry 1
rna. 1
rnd efflux pumps 1
secondary structure prediction 1
secure multiparty computation 1
semi-nonnegative matrix factorization 1
simple non-standard pseudoknot 1
timed-release encryption 1
transaction patterns 1
transcription factors - chemistry - metabolism 1
transcription factors/genetics 1
visualization 1
weak balance theory 1
View More
Keywords in Grants
keywordsNo. of Investigators
engineering education 13
financial technology, stability, inclusion 9
diagnosing, fungal infections, artificial intelligence 7
antibiotic resistome, pollution hotspots to environments, control strategies 5
bim square, construction logistics, supply chain management, hong kong 5
genomic and pharmaceutical knowledge-based system, clinical diagnosis and case repository 5
ad hoc network 4
genomic and pharmaceutical knowledge-based, clinical diagnosis and case repository 4
fintech, financial technology, artificial intelligence, blockchain, internet of things 3
key technologies, mobile internet, forensics 3
prmt1, stem cell, leukemia, mll, cd41 3
block cipher, hash function, mac, cryptanalysis, implementation 2
bmi-1, socs, jak-stat, leukemia 2
cryptographic schemes, delegation network 2
genome assembly, sequence assembly, rna sequencing, reads, contigs 2
indexing data structures, biological sequences 2
research problems on carving, tamper detection, forensic investigation 2
computational, molecular, biology 1
genomic studies, plant-environment interaction, sustainable agriculture and food security 1
lineage specificity, tissue specificity, evolutionary rate, disordered proteins, gene regulation 1
phylogenetic network, algorithms 1
rna secondary structure, structural alignment, structural prediction, tertiary interaction 1
secure computation, enabled blockchain, (sc-enabled blockchain) 1
security and privacy, cloud storage, information search, big data, mobile and cloud computing 1
View More