UM

Browse/Search Results:  1-10 of 11 Help

Selected(0)Clear Items/Page:    Sort:
CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition Journal article
Wang, Yifan, Gui, Jie, Tang, Yuan Yan, Kwok, James T.. CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 7810-7823.
Authors:  Wang, Yifan;  Gui, Jie;  Tang, Yuan Yan;  Kwok, James T.
Favorite | TC[WOS]:2 TC[Scopus]:2  IF:6.3/7.3 | Submit date:2024/09/03
Cancelable Biomrtrics  Finger Vein Recognition  Convolutional Neural Network  Object Localization  Plug-and-play  Template Protection  Security And Privacy  
A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification Journal article
Peng Lin, Kejiang Ye, Yishen Hu, Yanying Lin, Cheng Zhong Xu. A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification[J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 31(3), 1369-1384.
Authors:  Peng Lin;  Kejiang Ye;  Yishen Hu;  Yanying Lin;  Cheng Zhong Xu
Favorite | TC[WOS]:19 TC[Scopus]:24  IF:3.0/3.6 | Submit date:2023/01/30
Cryptography  Deep Learning  Encrypted Traffic Classification  Encryption  Feature Extraction  Markov Processes  Multimodal Learning  Network Security  Protocols  Quality Of Service  Servers  
Scheduling thermostatically controlled loads to provide regulation capacity based on a learning-based optimal power flow model Journal article
Chen, Ge, Zhang, Hongcai, Hui, Hongxun, Dai, Ningyi, Song, Yonghua. Scheduling thermostatically controlled loads to provide regulation capacity based on a learning-based optimal power flow model[J]. IEEE Transactions on Sustainable Energy, 2021, 12(4), 2459-2470.
Authors:  Chen, Ge;  Zhang, Hongcai;  Hui, Hongxun;  Dai, Ningyi;  Song, Yonghua
Favorite | TC[WOS]:46 TC[Scopus]:54  IF:8.6/8.6 | Submit date:2021/09/09
Optimal Power Flow  Demand-side Feasibility  Regulation Capacity  Neural Network  Security Constraint  
Big data mining algorithms for fog computing Conference paper
Simon Fong. Big data mining algorithms for fog computing[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 57-61.
Authors:  Simon Fong
Favorite | TC[WOS]:4 TC[Scopus]:3 | Submit date:2019/02/13
Computer Network Security  Security Threats  Sme  
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT Conference paper
Yaoyang Wu, Simon Fong, Yan Zhuang. General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 134-140.
Authors:  Yaoyang Wu;  Simon Fong;  Yan Zhuang
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Computer Network Security  Security Threats  Sme  
A Modular Approach for Implementation of Honeypots in Cyber Security Journal article
Muneeb Mirza, Muhammad Usman, Robert P. Biuk-Aghai, Simon Fong. A Modular Approach for Implementation of Honeypots in Cyber Security[J]. International Journal of Applied Engineering Research, 2016, 11(8), 5446-5451.
Authors:  Muneeb Mirza;  Muhammad Usman;  Robert P. Biuk-Aghai;  Simon Fong
Favorite |  | Submit date:2019/02/13
Honeypots  Intrusion Detection System  Antimalware  Signature  Cyber Security  Network Security  Antivirus  
Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm Conference paper
Rui Tang, Luke Lu, Yan Zhuang, Simon Fong. Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm[C]:IEEE, 2013, 280-285.
Authors:  Rui Tang;  Luke Lu;  Yan Zhuang;  Simon Fong
Favorite | TC[WOS]:1 TC[Scopus]:5 | Submit date:2019/02/13
Social Network  Security  Trust Index  
The network security regime for the hybrid connection of healthcare entities Conference paper
Ip C.H., Pun S.H., Vai M.I., Mak P.U.. The network security regime for the hybrid connection of healthcare entities[C], 2012, 1832-1834.
Authors:  Ip C.H.;  Pun S.H.;  Vai M.I.;  Mak P.U.
Favorite | TC[Scopus]:1 | Submit date:2019/02/14
Healthcare Information Systems  Hospital Network  Nat  Network Policy  Security  
Multi-way association clustering analysis on adaptive real-time multicast data Conference paper
Sheneela Naz, Sohail Asghar, Simon Fong, Amir Qayyum. Multi-way association clustering analysis on adaptive real-time multicast data[C], 2011, 383-394.
Authors:  Sheneela Naz;  Sohail Asghar;  Simon Fong;  Amir Qayyum
Favorite | TC[WOS]:0 TC[Scopus]:1 | Submit date:2019/02/13
Association Rules  Clustering  Network Security  Real-time Multicast  
Simulation Analysis of the DoS Attack in Internet Service Conference paper
Zhaotong Lian, Jian Lin. Simulation Analysis of the DoS Attack in Internet Service[C], 2007, 6298-6301.
Authors:  Zhaotong Lian;  Jian Lin
Favorite | TC[WOS]:1 TC[Scopus]:2 | Submit date:2019/12/02
Network Security  Dos  Syn Flood Attack  Queueing System