×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [9]
THE STATE KEY LA... [2]
INSTITUTE OF MIC... [1]
Faculty of Busin... [1]
INSTITUTE OF COL... [1]
Authors
FONG SIMON JAMES [5]
SONG YONGHUA [1]
TANG YUAN YAN [1]
DAI NINGYI [1]
VAI MANG I [1]
PUN SIO HANG [1]
More...
Document Type
Conference paper [7]
Journal article [4]
Date Issued
2024 [1]
2022 [1]
2021 [1]
2017 [2]
2016 [1]
2013 [1]
More...
Language
英語English [11]
Source Publication
BDIOT2017: Proce... [2]
2001 Internation... [1]
2007 INTERNATION... [1]
Communications i... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
More...
Indexed By
SCIE [4]
CPCI-S [3]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 11
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Issue Date Ascending
Issue Date Descending
Submit date Ascending
Submit date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition
Journal article
Wang, Yifan, Gui, Jie, Tang, Yuan Yan, Kwok, James T.. CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 7810-7823.
Authors:
Wang, Yifan
;
Gui, Jie
;
Tang, Yuan Yan
;
Kwok, James T.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
2
IF:
6.3
/
7.3
|
Submit date:2024/09/03
Cancelable Biomrtrics
Finger Vein Recognition
Convolutional Neural Network
Object Localization
Plug-and-play
Template Protection
Security And Privacy
A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification
Journal article
Peng Lin, Kejiang Ye, Yishen Hu, Yanying Lin, Cheng Zhong Xu. A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification[J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 31(3), 1369-1384.
Authors:
Peng Lin
;
Kejiang Ye
;
Yishen Hu
;
Yanying Lin
;
Cheng Zhong Xu
Favorite
|
TC[WOS]:
19
TC[Scopus]:
24
IF:
3.0
/
3.6
|
Submit date:2023/01/30
Cryptography
Deep Learning
Encrypted Traffic Classification
Encryption
Feature Extraction
Markov Processes
Multimodal Learning
Network Security
Protocols
Quality Of Service
Servers
Scheduling thermostatically controlled loads to provide regulation capacity based on a learning-based optimal power flow model
Journal article
Chen, Ge, Zhang, Hongcai, Hui, Hongxun, Dai, Ningyi, Song, Yonghua. Scheduling thermostatically controlled loads to provide regulation capacity based on a learning-based optimal power flow model[J]. IEEE Transactions on Sustainable Energy, 2021, 12(4), 2459-2470.
Authors:
Chen, Ge
;
Zhang, Hongcai
;
Hui, Hongxun
;
Dai, Ningyi
;
Song, Yonghua
Favorite
|
TC[WOS]:
46
TC[Scopus]:
54
IF:
8.6
/
8.6
|
Submit date:2021/09/09
Optimal Power Flow
Demand-side Feasibility
Regulation Capacity
Neural Network
Security Constraint
Big data mining algorithms for fog computing
Conference paper
Simon Fong. Big data mining algorithms for fog computing[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 57-61.
Authors:
Simon Fong
Favorite
|
TC[WOS]:
4
TC[Scopus]:
3
|
Submit date:2019/02/13
Computer Network Security
Security Threats
Sme
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT
Conference paper
Yaoyang Wu, Simon Fong, Yan Zhuang. General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 134-140.
Authors:
Yaoyang Wu
;
Simon Fong
;
Yan Zhuang
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/02/13
Computer Network Security
Security Threats
Sme
A Modular Approach for Implementation of Honeypots in Cyber Security
Journal article
Muneeb Mirza, Muhammad Usman, Robert P. Biuk-Aghai, Simon Fong. A Modular Approach for Implementation of Honeypots in Cyber Security[J]. International Journal of Applied Engineering Research, 2016, 11(8), 5446-5451.
Authors:
Muneeb Mirza
;
Muhammad Usman
;
Robert P. Biuk-Aghai
;
Simon Fong
Favorite
|
|
Submit date:2019/02/13
Honeypots
Intrusion Detection System
Antimalware
Signature
Cyber Security
Network Security
Antivirus
Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm
Conference paper
Rui Tang, Luke Lu, Yan Zhuang, Simon Fong. Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm[C]:IEEE, 2013, 280-285.
Authors:
Rui Tang
;
Luke Lu
;
Yan Zhuang
;
Simon Fong
Favorite
|
TC[WOS]:
1
TC[Scopus]:
5
|
Submit date:2019/02/13
Social Network
Security
Trust Index
The network security regime for the hybrid connection of healthcare entities
Conference paper
Ip C.H., Pun S.H., Vai M.I., Mak P.U.. The network security regime for the hybrid connection of healthcare entities[C], 2012, 1832-1834.
Authors:
Ip C.H.
;
Pun S.H.
;
Vai M.I.
;
Mak P.U.
Favorite
|
TC[Scopus]:
1
|
Submit date:2019/02/14
Healthcare Information Systems
Hospital Network
Nat
Network Policy
Security
Multi-way association clustering analysis on adaptive real-time multicast data
Conference paper
Sheneela Naz, Sohail Asghar, Simon Fong, Amir Qayyum. Multi-way association clustering analysis on adaptive real-time multicast data[C], 2011, 383-394.
Authors:
Sheneela Naz
;
Sohail Asghar
;
Simon Fong
;
Amir Qayyum
Favorite
|
TC[WOS]:
0
TC[Scopus]:
1
|
Submit date:2019/02/13
Association Rules
Clustering
Network Security
Real-time Multicast
Simulation Analysis of the DoS Attack in Internet Service
Conference paper
Zhaotong Lian, Jian Lin. Simulation Analysis of the DoS Attack in Internet Service[C], 2007, 6298-6301.
Authors:
Zhaotong Lian
;
Jian Lin
Favorite
|
TC[WOS]:
1
TC[Scopus]:
2
|
Submit date:2019/12/02
Network Security
Dos
Syn Flood Attack
Queueing System