default search action
Yang-Wai Chow
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Parisasadat Shojaei, Elena Vlahu-Gjorgievska, Yang-Wai Chow:
Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review. Comput. 13(2): 41 (2024) - [j19]Madhav Mukherjee, Ngoc-Thuy Le, Yang-Wai Chow, Willy Susilo:
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes. Inf. 15(2): 117 (2024) - [c45]Wei Zong, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Seyit Camtepe:
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. AAAI 2024: 7837-7845 - [c44]Yuanyuan Jiang, Jianke Yu, Zhangyi Xu, Chen Chen, Yang-Wai Chow, Ying Zhang:
SBGMN: A Multi-view Sign Prediction Network for Bipartite Graphs. APWeb/WAIM (3) 2024: 81-96 - 2023
- [j18]Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo, Yang-Wai Chow, Anh The Ta:
HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference. Future Internet 15(12): 407 (2023) - [j17]Yang-Wai Chow, Willy Susilo, Yannan Li, Nan Li, Chau Nguyen:
Visualization and Cybersecurity in the Metaverse: A Survey. J. Imaging 9(1): 11 (2023) - [j16]Naghmeh Khajehali, Jun Yan, Yang-Wai Chow, Mahdi Fahmideh:
A Comprehensive Overview of IoT-Based Federated Learning: Focusing on Client Selection Methods. Sensors 23(16): 7235 (2023) - [j15]Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim, Yang-Wai Chow:
PCSF: Privacy-Preserving Content-Based Spam Filter. IEEE Trans. Inf. Forensics Secur. 18: 2856-2869 (2023) - [c43]Md Saifullah Razali, Alfian Abdul Halin, Yang-Wai Chow, Noris Mohd Norowi, Shyamala Doraisamy:
Sarcasm Relation to Time: Sarcasm Detection with Temporal Features and Deep Learning. PRICAI (2) 2023: 287-297 - [c42]Wei Zong, Yang-Wai Chow, Willy Susilo, Kien Do, Svetha Venkatesh:
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. SP 2023: 1667-1683 - 2022
- [j14]Md Saifullah Razali, Alfian Abdul Halin, Yang-Wai Chow, Noris Mohd Norowi, Shyamala Doraisamy:
Context-Driven Satire Detection With Deep Learning. IEEE Access 10: 78780-78787 (2022) - [j13]Jongkil Kim, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Intae Kim:
Functional Encryption for Pattern Matching with a Hidden String. Cryptogr. 6(1): 1 (2022) - [j12]Wei Zong, Yang-Wai Chow, Willy Susilo, Jongkil Kim, Ngoc-Thuy Le:
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns. J. Imaging 8(12): 324 (2022) - [j11]Pairat Thorncharoensri, Willy Susilo, Yang-Wai Chow:
Privacy-preserving file sharing on cloud storage with certificateless signcryption. Theor. Comput. Sci. 916: 1-21 (2022) - [c41]Wei Zong, Yang-Wai Chow, Willy Susilo:
High Quality Audio Adversarial Examples Without Using Psychoacoustics. CSS 2022: 163-177 - [c40]Faizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, Chau Nguyen:
Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN. MobiSec 2022: 180-194 - [c39]Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim, Yang-Wai Chow:
TLS Goes Low Cost: When TLS Meets Edge. WISA 2022: 102-113 - 2021
- [j10]Yang-Wai Chow, Willy Susilo, Jianfeng Wang, Richard Buckland, Joonsang Baek, Jongkil Kim, Nan Li:
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning. J. Netw. Comput. Appl. 173: 102834 (2021) - [j9]Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Wei Zong:
Exploiting QR Code Error Correction for Digital Image Watermarking. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 114-140 (2021) - [c38]Wei Zong, Yang-Wai Chow, Willy Susilo:
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition. ACISP 2021: 531-549 - [c37]Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim, Yang-Wai Chow, Dongxi Liu:
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments. ESORICS (2) 2021: 106-126 - [c36]Wei Zong, Yang-Wai Chow, Willy Susilo:
Black-Box Audio Adversarial Example Generation Using Variational Autoencoder. ICICS (2) 2021: 142-160 - [c35]Wei Zong, Yang-Wai Chow, Willy Susilo, Santu Rana, Svetha Venkatesh:
Targeted Universal Adversarial Perturbations for Automatic Speech Recognition. ISC 2021: 358-373 - [c34]Wei Zong, Yang-Wai Chow, Willy Susilo, Jongkil Kim:
Trojan Attacks and Defense for Speech Recognition. MobiSec 2021: 195-210 - [c33]Jongkil Kim, Willy Susilo, Yang-Wai Chow, Joonsang Baek, Intae Kim:
Pattern Matching over Encrypted Data with a Short Ciphertext. WISA 2021: 132-143 - 2020
- [j8]Wei Zong, Yang-Wai Chow, Willy Susilo:
Interactive three-dimensional visualization of network intrusion detection data for machine learning. Future Gener. Comput. Syst. 102: 292-306 (2020)
2010 – 2019
- 2019
- [j7]Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow:
Subversion in Practice: How to Efficiently Undermine Signatures. IEEE Access 7: 68799-68811 (2019) - [c32]Wei Zong, Yang-Wai Chow, Willy Susilo:
Dimensionality Reduction and Visualization of Network Intrusion Detection Data. ACISP 2019: 441-455 - [c31]Yang-Wai Chow, Willy Susilo, Jianfeng Wang, Richard Buckland, Joonsang Baek, Jongkil Kim, Nan Li:
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes. ML4CS 2019: 320-335 - [c30]Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim:
QR Code Watermarking for Digital Images. WISA 2019: 25-37 - [c29]Jongkil Kim, Joonsang Baek, Willy Susilo, Yang-Wai Chow:
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof. WISA 2019: 206-216 - [p1]Yang-Wai Chow, Willy Susilo, Pairat Thorncharoensri:
CAPTCHA Design and Security Issues. Advances in Cyber Security 2019: 69-92 - 2018
- [j6]Yang-Wai Chow, Willy Susilo, Joseph Tonien, Elena Vlahu-Gjorgievska, Guomin Yang:
Cooperative Secret Sharing Using QR Codes and Symmetric Keys. Symmetry 10(4): 95 (2018) - [c28]Wei Zong, Yang-Wai Chow, Willy Susilo:
A 3D Approach for the Visualization of Network Intrusion Detection Data. CW 2018: 308-315 - [c27]Joshua Brown, Zhi Quan Zhou, Yang-Wai Chow:
Metamorphic Testing of Navigation Software: A Pilot Study with Google Maps. HICSS 2018: 1-10 - [c26]Wei Zong, Yang-Wai Chow, Willy Susilo:
A Two-Stage Classifier Approach for Network Intrusion Detection. ISPEC 2018: 329-340 - [i2]Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow:
Subversion in Practice: How to Efficiently Undermine Signatures. IACR Cryptol. ePrint Arch. 2018: 1201 (2018) - 2017
- [j5]Yang-Wai Chow, Willy Susilo, James G. Phillips, Joonsang Baek, Elena Vlahu-Gjorgievska:
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(3): 18-35 (2017) - [c25]Yang-Wai Chow, Willy Susilo, Joseph Tonien, Wei Zong:
A QR Code Watermarking Approach Based on the DWT-DCT Technique. ACISP (2) 2017: 314-331 - [c24]Michal Kedziora, Yang-Wai Chow, Willy Susilo:
Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems. ATIS 2017: 3-13 - [c23]Yang-Wai Chow, Willy Susilo, Guomin Yang:
Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts. CDVE 2017: 65-72 - [c22]Yang-Wai Chow, Willy Susilo, Joonsang Baek:
Covert QR Codes: How to Hide in the Crowd. ISPEC 2017: 678-693 - 2016
- [c21]Yang-Wai Chow, Willy Susilo, Guomin Yang, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi:
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. ACISP (1) 2016: 409-425 - [c20]Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow:
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. AsiaCCS 2016: 201-210 - [c19]Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang:
Authentication and Transaction Verification Using QR Codes with a Mobile Device. SpaCCS 2016: 437-451 - [i1]Song Liu, Wanqing Li, Philip Ogunbona, Yang-Wai Chow:
Creating Simplified 3D Models with High Quality Textures. CoRR abs/1602.06645 (2016) - 2015
- [j4]Willy Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan:
Protecting peer-to-peer-based massively multiplayer online games. Int. J. Comput. Sci. Eng. 10(3): 293-305 (2015) - [c18]Song Liu, Wanqing Li, Philip Ogunbona, Yang-Wai Chow:
Creating Simplified 3D Models with High Quality Textures. DICTA 2015: 1-8 - 2014
- [j3]James G. Phillips, James Sargeant, Rowan P. Ogeil, Yang-Wai Chow, Alex Blaszczynski:
Self-Reported Gambling Problems and Digital Traces. Cyberpsychology Behav. Soc. Netw. 17(12): 742-748 (2014) - [j2]Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
On the security of text-based 3D CAPTCHAs. Comput. Secur. 45: 84-99 (2014) - [c17]Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi:
A Visual One-Time Password Authentication Scheme Using Mobile Devices. ICICS 2014: 243-257 - [c16]Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
A CAPTCHA Scheme Based on the Identification of Character Locations. ISPEC 2014: 60-74 - 2012
- [c15]Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
Breaking an Animated CAPTCHA Scheme. ACNS 2012: 12-29 - [c14]Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
Attacking Animated CAPTCHAs via Character Extraction. CANS 2012: 98-113 - [c13]Yang-Wai Chow, Willy Susilo, Duncan S. Wong:
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme. ICICS 2012: 10-21 - [c12]Yang-Wai Chow, Willy Susilo:
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family. ISPEC 2012: 170-181 - [c11]Willy Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan:
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. NSS 2012: 291-304 - 2011
- [c10]Yang-Wai Chow, Willy Susilo:
AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax. CANS 2011: 255-271 - [c9]Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
Breaking a 3D-Based CAPTCHA Scheme. ICISC 2011: 391-405 - 2010
- [c8]Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou:
STE3D-CAP: Stereoscopic 3D CAPTCHA. CANS 2010: 221-240 - [c7]Yang-Wai Chow, Willy Susilo, Hua-Yu Zhou:
CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs. CW 2010: 254-261
2000 – 2009
- 2007
- [j1]Yang-Wai Chow, Ronald Pose, Matthew Regan, James G. Phillips:
The Effects of HMD Attributes, Different Display and Scene Characteristics on Human Visual Perception of Region Warping Distortions. Int. J. Virtual Real. 6(1): 57-68 (2007) - 2006
- [b1]Yang-Wai Chow:
The region methodology for an address recalculation pipeline virtual reality system with priority rendering. Monash University, Australia, 2006 - [c6]Yang-Wai Chow, Ronald Pose, Matthew Regan, James G. Phillips:
Human visual perception of region warping distortions. ACSC 2006: 217-226 - [c5]Yang-Wai Chow, Ronald Pose, Matthew Regan, James G. Phillips:
Human visual perception of region warping distortions with different display and scene characteristics. GRAPHITE 2006: 357-365 - 2005
- [c4]Yang-Wai Chow, Ronald Pose, Matthew Regan:
Large Object Segmentation with Region Priority Rendering. ACSC 2005: 19-28 - [c3]Yang-Wai Chow, Ronald Pose, Matthew Regan:
Design issues in human visual perception experiments on region warping. IADIS AC 2005: 210-217 - [c2]Yang-Wai Chow, Ronald Pose, Matthew Regan:
Region warping in a virtual reality system with priority rendering. IADIS AC 2005: 451-458 - [c1]Yang-Wai Chow, Ronald Pose, Matthew Regan:
A networked virtual environment communications model using priority updating. IADIS AC 2005: 591-598
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint