Filter
Conference contribution

Search results

  • Multi-destination vehicular route planning with parking and traffic constraints

    Hakeem, A., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., Nov 12 2019, Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2019. Association for Computing Machinery, p. 298-307 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Moving cast shadow detection in video based on new chromatic criteria and statistical modeling

    Shi, H. & Liu, C., Dec 2019, Proceedings - 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019. Wani, M. A., Khoshgoftaar, T. M., Wang, D., Wang, H. & Seliya, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 196-201 6 p. 8999031. (Proceedings - 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Motivation-Aware task assignment in crowdsourcing

    Pilourdault, J., Amer-Yahia, S., Lee, D. & Roy, S. B., 2017, Advances in Database Technology - EDBT 2017: 20th International Conference on Extending Database Technology, Proceedings. Mitschang, B., Markl, V., Bress, S., Andritsos, P., Sattler, K-U. & Orlando, S. (eds.). OpenProceedings.org, p. 246-257 12 p. (Advances in Database Technology - EDBT; vol. 2017-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Morphological shape description using geometric spectrum on multidimensional binary images

    Shih, F. & Pu, C. C., Dec 1 1992, Proceedings of SPIE - The International Society for Optical Engineering. pt 2 ed. Publ by Int Soc for Optical Engineering, p. 907-918 12 p. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 1818, no. pt 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Monte Carlo estimation of economic capital

    Kaplan, Z. T., Li, Y. & Nakayama, M. K., Jan 31 2019, WSC 2018 - 2018 Winter Simulation Conference: Simulation for a Noble Cause. Institute of Electrical and Electronics Engineers Inc., p. 1754-1765 12 p. 8632308. (Proceedings - Winter Simulation Conference; vol. 2018-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Monitoring software technology evolution, one trend at a time

    Bai, Y. & Mili, A., 2007, 16th International Conference on Software Engineering and Data Engineering, SEDE 2007. p. 349-355 7 p. (16th International Conference on Software Engineering and Data Engineering, SEDE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Monitoring public health concerns using twitter sentiment classifications

    Ji, X., Chun, S. A. & Geller, J., 2013, Proceedings - 2013 IEEE International Conference on Healthcare Informatics, ICHI 2013. p. 335-344 10 p. 6680494. (Proceedings - 2013 IEEE International Conference on Healthcare Informatics, ICHI 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    60 Scopus citations
  • Moitree: A middleware for cloud-assisted mobile distributed apps

    Khan, M. A., Debnath, H., Paiker, N. R., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., May 19 2016, Proceedings - 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2016. Institute of Electrical and Electronics Engineers Inc., p. 21-30 10 p. 7474402. (Proceedings - 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Modeling the evolution of software engineering trends - A bottom up approach

    Rabai, L. B. A., Bai, Y. Z. & Mili, A., Dec 1 2009, ICSOFT 2009 - 4th International Conference on Software and Data Technologies, Proceedings. p. 47-54 8 p. (ICSOFT 2009 - 4th International Conference on Software and Data Technologies, Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Modeling stakeholder/value dependency through mean failure cost

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2010, 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10. 1852727. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Modeling redundancy: Quantitative and qualitative models

    Mili, A., Wu, L., Sheldon, F. T., Shereshevsky, M. & Desharnais, J., 2006, IEEE International Conference on Computer Systems and Applications, 2006. IEEE Computer Society, p. 1-8 8 p. 1618325. (IEEE International Conference on Computer Systems and Applications, 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Modeling real estate for school district identification

    Tan, F., Cheng, C. & Wei, Z., Jan 31 2017, Proceedings - 16th IEEE International Conference on Data Mining, ICDM 2016. Bonchi, F., Wu, X., Baeza-Yates, R., Domingo-Ferrer, J. & Zhou, Z-H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1227-1232 6 p. 7837977. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Modeling cybersecurity risks: Proof of concept of a holistic approach for integrated risk quantification

    Henshel, D., Alexeev, A., Cains, M., Rowe, J., Cam, H., Hoffman, B. & Neamtiu, I., Sep 14 2016, 2016 IEEE Symposium on Technologies for Homeland Security, HST 2016. Institute of Electrical and Electronics Engineers Inc., 7568937. (2016 IEEE Symposium on Technologies for Homeland Security, HST 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Modeling a vocabulary in an object-oriented database

    Liu, L. M., Halper, M., Gu, H. & Geller, J., Dec 1 1996, International Conference on Information and Knowledge Management, Proceedings. Barker, K. & Ozsu, M. T. (eds.). p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Model-based partial shape recognition using contour curvature and affine transformation

    Shih, F. Y. & Yeh, P., Dec 1 1990, Proc First Int Conf Syst Integr ICSI 90. Publ by IEEE, p. 294-301 8 p. (Proc First Int Conf Syst Integr ICSI 90).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • MobiStore: Achieving availability and load balance in a mobile P2P data store

    Khan, M. A., Yeh, L., Zeitouni, K. & Borcea, C., Jan 28 2015, Proceedings of the 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014. Institute of Electrical and Electronics Engineers Inc., p. 171-172 2 p. 7026295. (Proceedings of the 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Mining genes in DNA using genescout

    Yin, M. M. & Wang, J., Dec 1 2002, Proceedings - 2002 IEEE International Conference on Data Mining, ICDM 2002. p. 733-736 4 p. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Mining frequent agreement subtrees in phylogenetic databases

    Zhang, S. & Wang, J. T. L., Jan 1 2006, Proceedings of the Sixth SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, p. 222-233 12 p. (Proceedings of the Sixth SIAM International Conference on Data Mining; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Mining Concepts for a COVID Interface Terminology for Annotation of EHRs

    Keloth, V. K., Zhou, S., Lindemann, L., Elhanan, G., Einstein, A. J., Geller, J. & Perl, Y., Dec 10 2020, Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020. Wu, X., Jermaine, C., Xiong, L., Hu, X. T., Kotevska, O., Lu, S., Xu, W., Aluru, S., Zhai, C., Al-Masri, E., Chen, Z. & Saltz, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 3753-3760 8 p. 9377981. (Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Minimizing the number of late tasks with error constraint

    Leung, J. Y. T. & Wong, C. S., 1990, 1990 Proceedings 11th Real-Time Systems Symposium, RTSS 1990. p. 32-40 9 p. 128726. (Proceedings - Real-Time Systems Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Minimizing mean flowtime on master-slave machines

    Leung, J. Y. T. & Zhao, H., Dec 1 2004, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04. Arabnia, H. R. & Ni, J. (eds.). p. 939-945 7 p. (Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Minimizing financial cost of scientific workflows under deadline constraints in multi-cloud environments

    Gao, T., Wang, Y., Wu, C. Q., Li, R., Hou, A. & Xu, M., 2019, Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, p. 114-121 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F147772).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Methodology for evaluating security controls based on key performance indicators and stakeholder mission

    Sheldon, F. T., Abercrombie, R. K. & Mili, A., Apr 3 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755410. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • MEFS: Mobile edge file system for edge-assisted mobile apps

    Scotece, D., Paiker, N. R., Foschini, L., Bellavista, P., Ding, X. & Borcea, C., Jun 2019, 20th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2019. Institute of Electrical and Electronics Engineers Inc., 8792987. (20th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Medial axis transformation with single-pixel and connectivity preservation using Euclidean distance computation

    Shih, F. Y. & Pu, C. C., Dec 1 1990, Proceedings - International Conference on Pattern Recognition. Publ by IEEE, p. 723-725 3 p. (Proceedings - International Conference on Pattern Recognition; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Measuring reliability as a mean failure cost

    Mili, A. & Sheldon, F., 2007, Proceedings - 10th IEEE International Symposium on High Assurance Systems Engineering, HASE 2007. p. 403-404 2 p. 4404775. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Measuring and avoiding information loss during concept import from a source to a target ontology

    Geller, J., Klein, S. T. & Keloth, V. K., Jan 1 2019, IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Dietz, J., Aveiro, D. & Filipe, J. (eds.). SciTePress, p. 442-449 8 p. (IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Measurement-based performance profiles and dynamics of UDT over dedicated connections

    Liu, Q., Rao, N. S. V., Wu, C. Q., Yun, D., Kettimuthu, R. & Foster, I. T., Dec 14 2016, 2016 IEEE 24th International Conference on Network Protocols, ICNP 2016. IEEE Computer Society, 7784418. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2016-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Maximizing throughput in flow shop real-time scheduling

    Yamin, L. B., Li, J., Sarpatwar, K., Schieber, B. & Shachnai, H., Aug 1 2020, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2020. Byrka, J. & Meka, R. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, APPROX48. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 176).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Managing complex IT security processes with value based measures

    Abercrombie, R. K., Sheldon, F. T. & Mili, A., Jul 20 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings. 4925092. (2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Making Public Key Functional Encryption Function Private, Distributively

    Fan, X. & Tang, Q., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Verlag, p. 218-244 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10770 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Making any attribute-based encryption accountable, efficiently

    Lai, J. & Tang, Q., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Zhou, J., Soriano, M. & Lopez, J. (eds.). Springer Verlag, p. 527-547 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11099 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Machine learning based prediction of gliomas with germline mutations obtained from whole exome sequences from TCGA and 1000 Genomes Project

    Aljouie, A., Schatz, M. & Roshan, U., Oct 2019, 2019 3rd International Conference on Intelligent Computing in Data Sciences, ICDS 2019. Angelov, P., Boumhidi, J., Hagras, H., Nfaoui, E. H., Oubenaalla, Y., Loqman, C., Mestari, M. & Mousannif, H. (eds.). Institute of Electrical and Electronics Engineers Inc., 8942246. (2019 3rd International Conference on Intelligent Computing in Data Sciences, ICDS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Machine Learning-assisted Computational Steering of Large-scale Scientific Simulations

    Liu, W., Ye, Q., Wu, C. Q., Liu, Y., Zhou, X. & Shan, Y., 2021, 19th IEEE International Symposium on Parallel and Distributed Processing with Applications, 11th IEEE International Conference on Big Data and Cloud Computing, 14th IEEE International Conference on Social Computing and Networking and 11th IEEE International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2021. Institute of Electrical and Electronics Engineers Inc., p. 984-992 9 p. (19th IEEE International Symposium on Parallel and Distributed Processing with Applications, 11th IEEE International Conference on Big Data and Cloud Computing, 14th IEEE International Conference on Social Computing and Networking and 11th IEEE International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Machine Learning Approach to Detect Fake News, Misinformation in COVID-19 Pandemic

    Bojjireddy, S., Chun, S. A. & Geller, J., Jun 9 2021, Proceedings of the 22nd Annual International Conference on Digital Government Research: Digital Innovations for Public Values: Inclusive Collaboration and Community, DGO 2021. Lee, J., Pereira, G. V. & Hwang, S. (eds.). Association for Computing Machinery, p. 575-578 4 p. 3463762. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    4 Scopus citations
  • Low bias integrated path estimators

    Calvin, J., Dec 1 2007, Proceedings of the 2007 Winter Simulation Conference, WSC. p. 303-307 5 p. 4419616. (Proceedings - Winter Simulation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Local summarization and multi-level LSH for retrieving multi-variant audio tracks

    Yu, Y., Crucianu, M., Oria, V. & Chen, L., 2009, MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums. p. 341-350 10 p. (MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Local Quaternary Patterns and Feature Local Quaternary Patterns

    Gu, J. & Liu, C., Dec 1 2012, Proceedings of the 2012 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2012. p. 1100-1106 7 p. (Proceedings of the 2012 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2012; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • LINK: Location verification through immediate neighbors knowledge

    Talasila, M., Curtmola, R. & Borcea, C., Dec 1 2012, Mobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International ICST Conference, MobiQuitous 2010, Revised Selected Papers. p. 210-223 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 73 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Lightweight and compromise-resilient message authentication in sensor networks

    Zhang, W., Subramanian, N. & Wang, G., 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 2092-2100 9 p. 4509795. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Scopus citations
  • Life and Death Decisions by Cyber-Physical Systems

    Brooks, R. R., Zhong, X., Cordone, G., Venayagamoorthy, G. K. & Wu, C., Jan 1 2016, Signal Processing, Sensor/Information Fusion, and Target Recognition XXV. Kadar, I. (ed.). SPIE, p. xxix-xxxi 984201. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9842).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • LID-Fingerprint: A Local Intrinsic Dimensionality-Based Fingerprinting Method

    Houle, M. E., Oria, V., Rohloff, K. R. & Wali, A. M., 2018, Similarity Search and Applications - 11th International Conference, SISAP 2018, Proceedings. Marchand-Maillet, S., Silva, Y. N. & Chávez, E. (eds.). Springer Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • LHM: A logic-based hypertext data model for integrating hypertext and information systems

    Wan, J., Bieber, M., Wang, J. T. L. & Ng, P. A., 1995, Proceedings of the 28th Annual Hawaii International Conference on System Sciences, HICSS 1995. IEEE Computer Society, p. 350-359 10 p. 375615. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Leveraging social data for health care behavior analytics

    Ji, X., Cappellari, P., Chun, S. A. & Geller, J., 2015, Engineering the Web in the Big Data Era - 15th International Conference, ICWE 2015, Proceedings. Frasincar, F., Houben, G-J., Cimiano, P. & Schwabe, D. (eds.). Springer Verlag, p. 667-670 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9114).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Leveraging Pattern Mining Techniques for Efficient Keyword Search on Data Graphs

    Lu, X., Theodoratos, D. & Dimitriou, A., 2020, Web Information Systems Engineering - WISE 2019 Workshop, Demo, and Tutorial, Revised Selected Papers. U, L. H., Yang, J., Cai, Y., Karlapalem, K., Liu, A. & Huang, X. (eds.). Springer, p. 98-114 17 p. (Communications in Computer and Information Science; vol. 1155 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Leveraging homomorphisms and bitmaps to enable the mining of embedded patterns from large data trees

    Wu, X. & Theodoratos, D., 2015, Database Systems for Advanced Applications - 20th International Conference, DASFAA 2015, Proceedings Hanoi, Vietnam, April 20-23, 2015 Proceedings, Part I. Shahabi, C., Cheema, M. A., Renz, M. & Zhou, X. (eds.). Springer Verlag, p. 3-20 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9049).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Leveraging Double Simulation to Efficiently Evaluate Hybrid Patterns on Data Graphs

    Wu, X., Theodoratos, D., Skoutas, D. & Lan, M., 2020, Web Information Systems Engineering – WISE 2020 - 21st International Conference, Proceedings. Huang, Z., Beek, W., Wang, H., Zhang, Y. & Zhou, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12342 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog

    Chow, S. S. M., Russell, A., Tang, Q., Yung, M., Zhao, Y. & Zhou, H. S., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Lin, D. & Sako, K. (eds.). Springer Verlag, p. 221-251 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11442 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Le-git-imate: Towards verifiable web-based git repositories

    Afzali, H., Torres-Arias, S., Curtmola, R. & Cappos, J., May 29 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 469-482 14 p. (ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Learning the discriminative dictionary for sparse representation by a general fisher regularized model

    Liu, Q., Puthenputhussery, A. & Liu, C., Dec 9 2015, 2015 IEEE International Conference on Image Processing, ICIP 2015 - Proceedings. IEEE Computer Society, p. 4347-4351 5 p. 7351627. (Proceedings - International Conference on Image Processing, ICIP; vol. 2015-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations