×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [51]
THE STATE KEY L... [10]
INSTITUTE OF MIC... [5]
INSTITUTE OF APP... [3]
THE STATE KEY LA... [3]
Faculty of Arts ... [1]
More...
Authors
PUN CHI MAN [17]
ZHOU YICONG [9]
CHENGZHONG XU [5]
RUI PAULO DA SIL... [4]
MAK PUI IN [4]
LAW MAN KAY [4]
More...
Document Type
Journal article [50]
Conference pape... [16]
Date Issued
2024 [17]
2023 [11]
2022 [6]
2021 [9]
2020 [5]
2019 [3]
More...
Language
英語English [62]
中文Chinese [2]
Source Publication
IEEE Transaction... [3]
IEEE Transaction... [3]
IEEE TRANSACTION... [2]
IEEE Transaction... [2]
IEEE Transaction... [2]
IEEE Transaction... [2]
More...
Indexed By
SCIE [44]
CPCI-S [11]
Funding Organization
Funding Project
Securing Technol... [1]
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 66
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Issue Date Ascending
Issue Date Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Stepwise modeling approach to explore the interfacial behavior of Ca(OH)2/Sulfate
Journal article
Wang, Meng, Sun, Wangzhe, Hou, Dongshuai, Wang, Muhan, Zheng, Heping, Zhang, Jun, Chen, Binmeng. Stepwise modeling approach to explore the interfacial behavior of Ca(OH)2/Sulfate[J]. Journal of Building Engineering, 2024, 98, 111005.
Authors:
Wang, Meng
;
Sun, Wangzhe
;
Hou, Dongshuai
;
Wang, Muhan
;
Zheng, Heping
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
6.7
/
6.8
|
Submit date:2024/11/05
Atomic Simulation
Calcium Hydroxide
Interfacial Behavior
Ionic Hydration Layer
Sulfate Attack
Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns
Journal article
Yang, Shaohua, Lao, Keng Weng, Hui, Hongxun, Chen, Yulin. Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns[J]. IEEE Transactions on Power Systems, 2024, 39(6), 7277-7290.
Authors:
Yang, Shaohua
;
Lao, Keng Weng
;
Hui, Hongxun
;
Chen, Yulin
Favorite
|
TC[WOS]:
8
TC[Scopus]:
18
IF:
6.5
/
7.4
|
Submit date:2024/05/16
Demand Response
Deception Cyber-attack
Arbitrary Attack Pattern
Secure Distributed Control
Lyapunov Theorem
Contrastive semi-supervised adversarial training method for hyperspectral image classification networks 面向高光谱图像分类网络的对比半监督对抗训练方法
Journal article
Cheng, Shi, Ying, Liu, Minghua, Zhao, Qiguang, Miao, Chi-Man, Pun. Contrastive semi-supervised adversarial training method for hyperspectral image classification networks 面向高光谱图像分类网络的对比半监督对抗训练方法[J]. Journal of Image and Graphics, 2024, 29(7), 1861-1874.
Authors:
Cheng, Shi
;
Ying, Liu
;
Minghua, Zhao
;
Qiguang, Miao
;
Chi-Man, Pun
Favorite
|
TC[Scopus]:
0
|
Submit date:2024/09/03
Adversarial Attack
Adversarial Defense
Deep Neural Network
Hyperspectral Image Classification
Semi-supervised Learning
Black-box reversible adversarial examples with invertible neural network
Journal article
Huang, Jielun, Huang, Guoheng, Zhang, Xuhui, Yuan, Xiaochen, Xie, Fenfang, Pun, Chi Man, Zhong, Guo. Black-box reversible adversarial examples with invertible neural network[J]. Image and Vision Computing, 2024, 147, 105094.
Authors:
Huang, Jielun
;
Huang, Guoheng
;
Zhang, Xuhui
;
Yuan, Xiaochen
;
Xie, Fenfang
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
4.2
/
4.3
|
Submit date:2024/06/05
Adversarial Attack
Image Restoration
Invertible Neural Network
Fooling the Image Dehazing Models by First Order Gradient
Journal article
Gui, Jie, Cong, Xiaofeng, Peng, Chengwei, Tang, Yuan Yan, Kwok, James Tin Yau. Fooling the Image Dehazing Models by First Order Gradient[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34(7), 6265 - 6278.
Authors:
Gui, Jie
;
Cong, Xiaofeng
;
Peng, Chengwei
;
Tang, Yuan Yan
;
Kwok, James Tin Yau
Favorite
|
TC[WOS]:
0
TC[Scopus]:
4
IF:
8.3
/
7.1
|
Submit date:2024/05/16
Image Dehazing
Adversarial Attack And Defense
Security
First Order Gradient
Frequency-constrained transferable adversarial attack on image manipulation detection and localization
Journal article
Zeng, Yijia, Pun, Chi Man. Frequency-constrained transferable adversarial attack on image manipulation detection and localization[J]. The Visual Computer, 2024, 40(7), 4817-4828.
Authors:
Zeng, Yijia
;
Pun, Chi Man
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
3.0
/
3.0
|
Submit date:2024/07/04
Adversarial Attack
Forgery Image Detection And Localization
Reverse Image Forensics
Transferability
Observer-Based Security Control for Nonlinear Suspension Systems With Cyber-Attacks and Hybrid-Triggered Scheme
Journal article
Zhao, Jing, Jia, Junru, Li, Wenfeng, Zhang, Jinxi, Du, Haiping, Xie, Zhengchao, Wong, Pak Kin. Observer-Based Security Control for Nonlinear Suspension Systems With Cyber-Attacks and Hybrid-Triggered Scheme[J]. IEEE/ASME Transactions on Mechatronics, 2024, 1-12.
Authors:
Zhao, Jing
;
Jia, Junru
;
Li, Wenfeng
;
Zhang, Jinxi
;
Du, Haiping
; et al.
Favorite
|
TC[WOS]:
1
TC[Scopus]:
2
IF:
6.1
/
6.2
|
Submit date:2024/07/04
Attack Estimation
Hybrid Triggered Scheme
Security Control
Suspension Systems
Vibration Control
Mode-Holding Control for Markov Jump Systems: When Event-Triggering Effect Meets DoS Attack Threat
Journal article
Cao, Zhiru, Liu, Jason J.R., Peng, Chen. Mode-Holding Control for Markov Jump Systems: When Event-Triggering Effect Meets DoS Attack Threat[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2024, 71(6), 3096-3100.
Authors:
Cao, Zhiru
;
Liu, Jason J.R.
;
Peng, Chen
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
4.0
/
3.7
|
Submit date:2024/05/16
Markov Jump System
Networked Control System
Adaptive Event-triggered Mechanism
Stochastic Dos Attack
Sliding Mode Control
Adversarial false data injection attacks on deep learning-based short-term wind speed forecasting
Journal article
Yang, Lei, Liang, Gaoshen, Yang, Yanrong, Ruan, Jiaqi, Yu, Peipei, Yang, Chao. Adversarial false data injection attacks on deep learning-based short-term wind speed forecasting[J]. IET Renewable Power Generation, 2024, 18(7), 1370-1379.
Authors:
Yang, Lei
;
Liang, Gaoshen
;
Yang, Yanrong
;
Ruan, Jiaqi
;
Yu, Peipei
; et al.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
3
IF:
2.6
/
2.8
|
Submit date:2024/02/22
Adversarial False Data Injection Attack
Cyber Threat
Deep Learning
Renewable Energy
Resilience
Wind Speed Forecasting
Reversible Adversarial Image Examples with Beam Search Attack and Grayscale Invariance
Conference paper
Zhang, Haodong, Pun, Chi Man, Du, Xia. Reversible Adversarial Image Examples with Beam Search Attack and Grayscale Invariance[C]:SPIE-INT SOC OPTICAL ENGINEERING, 1000 20TH ST, PO BOX 10, BELLINGHAM, WA 98227-0010 USA, 2024.
Authors:
Zhang, Haodong
;
Pun, Chi Man
;
Du, Xia
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2024/06/05
Adversarial Attack
Beam Search
Grayscale Invariance
Reversible Data Hiding