UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
A DCT-based information hiding method for network authentication Conference paper
Wei Song, Shuanghui Zou, Yifei Tian, Chen Li, Su Sun, Simon Fong. A DCT-based information hiding method for network authentication[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 149-152.
Authors:  Wei Song;  Shuanghui Zou;  Yifei Tian;  Chen Li;  Su Sun; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Information Hiding  Network Authentication  Discrete Cosine Transform  Image Processing  
Big data mining algorithms for fog computing Conference paper
Simon Fong. Big data mining algorithms for fog computing[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 57-61.
Authors:  Simon Fong
Favorite | TC[WOS]:3 TC[Scopus]:3 | Submit date:2019/02/13
Computer Network Security  Security Threats  Sme  
An implementation of VR chemistry experiment system Conference paper
Jinkun Han, Yifei Tian, Wei Song, Simon Fong. An implementation of VR chemistry experiment system[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 205-208.
Authors:  Jinkun Han;  Yifei Tian;  Wei Song;  Simon Fong
Favorite | TC[WOS]:4 TC[Scopus]:5 | Submit date:2019/02/13
Virtual Reality  Leap Motion  Head-mounted Display  Wireless Sensor Network  
Human body and face detection based anti-shoulder attack system on atm Conference paper
Chen Li, Mengti Liang, Ke Xiao, Simon Fong, Qianli Wang, Wei Song. Human body and face detection based anti-shoulder attack system on atm[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 145-148.
Authors:  Chen Li;  Mengti Liang;  Ke Xiao;  Simon Fong;  Qianli Wang; et al.
Favorite | TC[WOS]:4 TC[Scopus]:3 | Submit date:2019/02/13
Human Body Detection  Face Detection  Atm Security  
Facial feature based secure information transmission Conference paper
Chen Li, Yanjie Wang, Simon Fong, Chenhui Duan, Wei Song. Facial feature based secure information transmission[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 141-144.
Authors:  Chen Li;  Yanjie Wang;  Simon Fong;  Chenhui Duan;  Wei Song
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Biometric Cryptosystems  Gabor Features  Secret Key Generation  
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT Conference paper
Yaoyang Wu, Simon Fong, Yan Zhuang. General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 134-140.
Authors:  Yaoyang Wu;  Simon Fong;  Yan Zhuang
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Computer Network Security  Security Threats  Sme  
Generating neural networks with optimal features through particle swarm optimization Conference paper
Ricardo Brito, Simon Fong, Yan Zhuang, Yaoyang Wu. Generating neural networks with optimal features through particle swarm optimization[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 96-101.
Authors:  Ricardo Brito;  Simon Fong;  Yan Zhuang;  Yaoyang Wu
Favorite | TC[WOS]:2 TC[Scopus]:5 | Submit date:2019/02/13
Particle Swarm Optimization (Pso)  Neural Networks  Feature Selection  Generative Algorithms