default search action
Kam-Pui Chow
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Yanan Gong, Kam-Pui Chow, Siu Ming Yiu, Hing-Fung Ting:
Analyzing the peeling chain patterns on the Bitcoin blockchain. Forensic Sci. Int. Digit. Investig. 46(Supplement): 301614 (2023) - [c104]Tianyi Wang, Kam-Pui Chow:
Noise Based Deepfake Detection via Multi-Head Relative-Interaction. AAAI 2023: 14548-14556 - [c103]Yuanyuan Wang, Gengwang Li, Min Yu, Kam-Pui Chow, Jianguo Jiang, Xiang Meng, Weiqing Huang:
A Dynamic Malicious Document Detection Method Based on Multi-Memory Features. IFIP Int. Conf. Digital Forensics 2023: 203-218 - [c102]Shenzhi Qin, Yubo Lang, Kam-Pui Chow:
Traceable Transformer-Based Anomaly Detection for a Water Treatment System. IFIP Int. Conf. Digital Forensics 2023: 219-234 - [c101]Chun-Fai Chan, Kam-Pui Chow:
Process Mining with Programmable Logic Controller Memory States. UbiSec 2023: 96-113 - 2022
- [j22]Tianyi Wang, Ming Liu, Wei Cao, Kam-Pui Chow:
Deepfake noise investigation and detection. Digit. Investig. 42(Supplement): 301395 (2022) - [j21]Yanan Gong, Kam-Pui Chow, Siu-Ming Yiu, Hing-Fung Ting:
Sensitivity analysis for a Bitcoin simulation model. Digit. Investig. 43(Supplement): 301449 (2022) - [c100]Ao Shen, Kam-Pui Chow:
Community Detection in a Web Discussion Forum During Social Unrest Events. IFIP Int. Conf. Digital Forensics 2022: 169-185 - [c99]Yanan Gong, Kam-Pui Chow, Hing-Fung Ting, Siu-Ming Yiu:
Analyzing the Error Rates of Bitcoin Clustering Heuristics. IFIP Int. Conf. Digital Forensics 2022: 187-205 - [i5]Tianyi Wang, Harry Cheng, Kam-Pui Chow, Liqiang Nie:
Deep Convolutional Pooling Transformer for Deepfake Detection. CoRR abs/2209.05299 (2022) - [i4]Tianyi Wang, Kam-Pui Chow, Xiaojun Chang, Yinglong Wang:
Deepfake Detection: A Comprehensive Study from the Reliability Perspective. CoRR abs/2211.10881 (2022) - 2021
- [c98]Tianyi Wang, Shengzhi Qin, Kam-Pui Chow:
Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach. CSE 2021: 146-153 - [c97]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
Detecting Anomalous Programmable Logic Controller Events Using Process Mining. Critical Infrastructure Protection 2021: 119-133 - [c96]Chun-Fai Chan, Kam-Pui Chow, Tim Tang:
Security Analysis of Software Updates for Industrial Robots. Critical Infrastructure Protection 2021: 229-245 - [c95]Jianguo Jiang, Nan Song, Min Yu, Kam-Pui Chow, Gang Li, Chao Liu, Weiqing Huang:
Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning. IFIP Int. Conf. Digital Forensics 2021: 135-155 - [c94]Shengzhi Qin, Qiaokun Wen, Kam-Pui Chow:
Predicting the Locations of Unrest Using Social Media. IFIP Int. Conf. Digital Forensics 2021: 177-191 - 2020
- [j20]Tianyi Wang, Ke Lu, Kam-Pui Chow, Qing Zhu:
COVID-19 Sensing: Negative Sentiment Analysis on Social Media in China via BERT Model. IEEE Access 8: 138162-138169 (2020) - [c93]Yanan Gong, Kam-Pui Chow, Yonghao Mai, Jun Zhang, Chun-Fai Chan:
Forensic Investigation of A Hacked Industrial Robot. Critical Infrastructure Protection 2020: 221-241 - [c92]Weiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow, Jiuming Chen, Chao Liu, Jianguo Jiang:
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors. IFIP Int. Conf. Digital Forensics 2020: 57-72 - [c91]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines. IFIP Int. Conf. Digital Forensics 2020: 95-108 - [c90]Wencan Wu, Kam-Pui Chow, Yonghao Mai, Jun Zhang:
Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition. IFIP Int. Conf. Digital Forensics 2020: 203-214 - [c89]Yichen Wei, Kam-Pui Chow, Siu-Ming Yiu:
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning. IFIP Int. Conf. Digital Forensics 2020: 273-290 - [c88]Ao Shen, Kam-Pui Chow:
Time and Location Topic Model for analyzing Lihkg forum data. SADFE 2020: 32-37
2010 – 2019
- 2019
- [c87]Raymond Chan, Kam-Pui Chow, Chun-Fai Chan:
Defining Attack Patterns for Industrial Control Systems. Critical Infrastructure Protection 2019: 289-309 - [c86]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
An Incident Response Model for Industrial Control System Forensics Based on Historical Events. Critical Infrastructure Protection 2019: 311-328 - [c85]Chun-Fai Chan, Kam-Pui Chow, Cesar Mak, Raymond Chan:
Detecting Anomalies in Programmable Logic Controllers Using Unsupervised Machine Learning. IFIP Int. Conf. Digital Forensics 2019: 119-130 - [c84]Tianyi Wang, Kam-Pui Chow:
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction. ISI 2019: 197-199 - 2018
- [j19]Ping Zhang, Yijun He, Kam-Pui Chow:
Fraud Track on Secure Electronic Check System. Int. J. Digit. Crime Forensics 10(2): 137-144 (2018) - [j18]Xuan Zhang, Kam-Pui Chow:
A Framework for Dark Web Threat Intelligence Analysis. Int. J. Digit. Crime Forensics 10(4): 108-117 (2018) - [j17]Michael Martin Losavio, Kam-Pui Chow, Andras Koltay, Joshua James:
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Secur. Priv. 1(3) (2018) - [c83]Richard E. Overill, Kam-Pui Chow:
Measuring Evidential Weight in Digital Forensic Investigations. IFIP Int. Conf. Digital Forensics 2018: 3-10 - [c82]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
A Forensic Logging System for Siemens Programmable Logic Controllers. IFIP Int. Conf. Digital Forensics 2018: 331-349 - [c81]Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau:
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers. IFIP Int. Conf. Digital Forensics 2018: 351-367 - [c80]Chi Yuen Tseung, Kam-Pui Chow:
Forensic-Aware Anti-DDoS Device. IEEE Symposium on Security and Privacy Workshops 2018: 148-159 - 2017
- [c79]Ken Yau, Kam-Pui Chow, Siu-Ming Yiu, Chun-Fai Chan:
Detecting anomalous behavior of PLC using semi-supervised machine learning. CNS 2017: 580-585 - [c78]Raymond Chan, Kam-Pui Chow:
Threat Analysis of an Elevator Control System. Critical Infrastructure Protection 2017: 175-192 - [c77]Ken Yau, Kam-Pui Chow:
Detecting Anomalous Programmable Logic Controller Events Using Machine Learning. IFIP Int. Conf. Digital Forensics 2017: 81-94 - [c76]C. Y. Tseung, Kam-Pui Chow, X. Zhang:
Extended abstract: Anti-DDoS technique using self-learning bloom filter. ISI 2017: 204 - [p2]Junbin Fang, Zoe Lin Jiang, Sijin Li, Siu-Ming Yiu, Lucas C. K. Hui, Kam-Pui Chow:
Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone. Mobile Security and Privacy 2017: 205-216 - 2016
- [j16]Yanbin Tang, Junbin Fang, Kam-Pui Chow, Siu-Ming Yiu, Jun Xu, Bo Feng, Qiong Li, Qi Han:
Recovery of heavily fragmented JPEG files. Digit. Investig. 18 Supplement: S108-S117 (2016) - [c75]Min Yang, Fei Xu, Kam-Pui Chow:
Interest Profiling for Security Monitoring and Forensic Investigation. ACISP (2) 2016: 457-464 - [c74]Raymond Chan, Kam-Pui Chow:
Forensic Analysis of a Siemens Programmable Logic Controller. Critical Infrastructure Protection 2016: 117-130 - [c73]Raymond Chan, Kam-Pui Chow, Vivien P. S. Chan, Michael Y. K. Kwan:
The Cloud Storage Ecosystem - A New Business Model for Internet Piracy? IFIP Int. Conf. Digital Forensics 2016: 237-255 - [c72]Vivien P. S. Chan, Kam-Pui Chow, Raymond Chan:
Profiling Flash Mob Organizers in Web Discussion Forums. IFIP Int. Conf. Digital Forensics 2016: 281-293 - 2015
- [j15]Xiao-Xi Fan, Kam-Pui Chow:
Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis. J. Digit. Forensics Secur. Law 10(4): 17-30 (2015) - [j14]Ken Yau, Kam-Pui Chow:
PLC Forensics Based on Control Program Logic Change Detection. J. Digit. Forensics Secur. Law 10(4): 59-68 (2015) - [c71]Kam-Pui Chow, Ken Yau, Frankie Li:
Cyber Attacks and Political Events: The Case of the Occupy Central Campaign. Critical Infrastructure Protection 2015: 17-27 - [c70]Min Yang, Kam-Pui Chow:
An Information Extraction Framework for Digital Forensic Investigations. IFIP Int. Conf. Digital Forensics 2015: 61-76 - [c69]Xiao-Xi Fan, Kam-Pui Chow, Fei Xu:
Profiling and Tracking a Cyberlocker Link Sharer in a Public Web Forum. IFIP Int. Conf. Digital Forensics 2015: 97-113 - [c68]Fei Xu, Ken Yau, Ping Zhang, Kam-Pui Chow:
A Privacy-Preserving Encryption Scheme for an Internet Realname Registration System. IFIP Int. Conf. Digital Forensics 2015: 115-128 - [c67]Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Jun-bin Fang, Xiamu Niu, Qi Han, Xianyan Wu:
Fragmented JPEG File Recovery Using Pseudo Headers. IFIP Int. Conf. Digital Forensics 2015: 215-231 - [c66]Min Yang, Wenting Tu, Ziyu Lu, Wenpeng Yin, Kam-Pui Chow:
LCCT: A Semi-supervised Model for Sentiment Classification. HLT-NAACL 2015: 546-555 - 2014
- [j13]Kam-Pui Chow, Frank Y. W. Law, Y. H. Mai:
Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case. J. Digit. Forensics Secur. Law 9(2): 51-58 (2014) - [j12]Pierre K. Y. Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Modeling the initial stage of a file sharing process on a BitTorrent network. Peer-to-Peer Netw. Appl. 7(4): 311-319 (2014) - [c65]Min Yang, Dingju Zhu, Kam-Pui Chow:
A Topic Model for Building Fine-grained Domain-specific Emotion Lexicon. ACL (2) 2014: 421-426 - [c64]Fei Xu, Michael Y. K. Kwan, Hayson Tse, Kam-Pui Chow:
A bayesian belief network for data leakage investigation. SFCS@ASIACCS 2014: 19-24 - [c63]Min Yang, Dingju Zhu, Rashed Mustafa, Kam-Pui Chow:
Learning Domain-specific Sentiment Lexicon with Supervised Sentiment-aware LDA. ECAI 2014: 927-932 - [c62]Vivien P. S. Chan, Kam-Pui Chow, Michael Y. K. Kwan, Guy Fong, Michael Hui, Jemy Tang:
An Exploratory Profiling Study of Online Auction Fraudsters. IFIP Int. Conf. Digital Forensics 2014: 43-56 - [c61]Xiao-Xi Fan, Kam-Pui Chow, Fei Xu:
Web User Profiling Based on Browsing Behavior Analysis. IFIP Int. Conf. Digital Forensics 2014: 57-71 - [c60]Ricci S. C. Ieong, Kam-Pui Chow:
Validation Rules for Enhanced Foxy P2P Network Investigations. IFIP Int. Conf. Digital Forensics 2014: 73-83 - [c59]Min Yang, Kam-Pui Chow:
Authorship Attribution for Forensic Investigation with Thousands of Authors. SEC 2014: 339-350 - 2013
- [j11]Yunming Ye, Qingyao Wu, Yan Li, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Unknown Chinese word extraction based on variety of overlapping strings. Inf. Process. Manag. 49(2): 497-512 (2013) - [j10]Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. IEEE Trans. Inf. Forensics Secur. 8(5): 821-828 (2013) - [c58]Y. Liang, Kam-Pui Chow, Lucas Chi Kwong Hui, Jun-bin Fang, Siu-Ming Yiu, Shuhui Hou:
Towards a Better Similarity Measure for Keyword Profiling via Clustering. COMPSAC Workshops 2013: 16-20 - [c57]Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan:
A Generic Bayesian Belief Model for Similar Cyber Crimes. IFIP Int. Conf. Digital Forensics 2013: 243-255 - [c56]Pierre K. Y. Lai, Kam-Pui Chow, Xiao-Xi Fan, Vivien P. S. Chan:
An Empirical Study Profiling Internet Pirates. IFIP Int. Conf. Digital Forensics 2013: 257-272 - [c55]Fei Xu, Jinqiao Shi, Xiaojun Chen, Kam-Pui Chow:
A Three-Dimensional Evaluation Model for Network Management System. ITQM 2013: 888-892 - [c54]Richard E. Overill, Jantje A. M. Silomon, Kam-Pui Chow, Hayson Tse:
Quantification of digital forensic hypotheses using probability theory. SADFE 2013: 1-5 - [c53]Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan:
The next generation for the forensic extraction of electronic evidence from mobile telephones. SADFE 2013: 1-7 - [c52]Gang Zhou, Yanbin Tang, Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Rongsheng Xu, Yonghao Mai, Shuhui Hou, Fei Xu:
Photo Forensics on Shanzhai Mobile Phone. WASA 2013: 454-464 - 2012
- [c51]Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan:
Reasoning about Evidence using Bayesian Networks. IFIP Int. Conf. Digital Forensics 2012: 99-113 - [c50]Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang:
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. IFIP Int. Conf. Digital Forensics 2012: 129-142 - [c49]Ricci S. C. Ieong, Kam-Pui Chow, Pierre K. Y. Lai:
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations. IFIP Int. Conf. Digital Forensics 2012: 231-245 - 2011
- [j9]Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Meng-meng Sheng:
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics. J. Zhejiang Univ. Sci. C 12(10): 809-818 (2011) - [c48]Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai:
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations. IFIP Int. Conf. Digital Forensics 2011: 231-243 - [c47]Xueling Zheng, Yiu Ming Lai, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Sockpuppet Detection in Online Discussion Forums. IIH-MSP 2011: 374-377 - [c46]Shuhui Hou, Tetsutaro Uehara, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers. IIH-MSP 2011: 378-383 - [c45]Yuk-Ming Lai, Xueling Zheng, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Automatic Online Monitoring and Data-Mining Internet Forums. IIH-MSP 2011: 384-387 - [c44]Rongsheng Xu, Kam-Pui Chow, Ying Yang:
Development of Domestic and International Computer Forensics. IIH-MSP 2011: 388-394 - [c43]Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7 - [c42]Frank Y. W. Law, Patrick P. F. Chan, Siu-Ming Yiu, Kam-Pui Chow, Michael Y. K. Kwan, Hayson Tse, Pierre K. Y. Lai:
Protecting Digital Data Privacy in Computer Forensic Examination. SADFE 2011: 1-6 - 2010
- [j8]Meiqin Wang, Xiaoyun Wang, Kam-Pui Chow, Lucas Chi Kwong Hui:
New Differential Cryptanalytic Results for Reduced-Round CAST-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(12): 2744-2754 (2010) - [c41]Richard E. Overill, Jantje A. M. Silomon, Kam-Pui Chow:
A Complexity Based Model for Quantifying Forensic Evidential Probabilities. ARES 2010: 671-676 - [c40]Eric Ke Wang, Yunming Ye, Xiaofei Xu, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Security Issues and Challenges for Cyber Physical System. GreenCom/CPSCom 2010: 733-738 - [c39]Frankie Li, Hilton Chan, Kam-Pui Chow, Pierre K. Y. Lai:
An Analysis of the Green Dam Youth Escort Software. IFIP Int. Conf. Digital Forensics 2010: 49-62 - [c38]Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Jantje A. M. Silomon, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai:
Evaluation of Evidence in Internet Auction Fraud Investigations. IFIP Int. Conf. Digital Forensics 2010: 121-132 - [c37]Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law:
Identifying First Seeders in Foxy Peer-to-Peer Networks. IFIP Int. Conf. Digital Forensics 2010: 151-168 - [c36]Frank Y. W. Law, Patrick P. F. Chan, Siu-Ming Yiu, Benjamin Tang, Pierre K. Y. Lai, Kam-Pui Chow, Ricci S. C. Ieong, Michael Y. K. Kwan, Wing-Kai Hon, Lucas Chi Kwong Hui:
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics. IFIP Int. Conf. Digital Forensics 2010: 185-194 - [c35]Ying Yang, Kam-Pui Chow, Lucas Chi Kwong Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen:
Forensic Analysis of Popular Chinese Internet Applications. IFIP Int. Conf. Digital Forensics 2010: 285-295 - [p1]Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law:
Forensic Investigation of Peer-to-Peer Networks. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 355-378 - [e1]Kam-Pui Chow, Sujeet Shenoi:
Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers. IFIP Advances in Information and Communication Technology 337, Springer 2010, ISBN 978-3-642-15505-5 [contents]
2000 – 2009
- 2009
- [c34]Frank Y. W. Law, Kam-Pui Chow, Pierre K. Y. Lai, Hayson Tse:
A Host-Based Approach to BotNet Investigation? ICDF2C 2009: 161-170 - [c33]X. C. He, Jacky S.-C. Yuk, Kam-Pui Chow, Kwan-Yee Kenneth Wong, Ronald H. Y. Chung:
Super-Resolution of Faces Using Texture Mapping on a Generic 3D Model. ICIG 2009: 361-365 - [c32]X. C. He, Jacky S.-C. Yuk, Kam-Pui Chow, Kwan-Yee Kenneth Wong, Ronald H. Y. Chung:
Automatic 3D face texture mapping framework from single image. ICIMCS 2009: 123-128 - [c31]Fei Xu, Kam-Pui Chow, Jingsha He, Xu Wu:
Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection. ICPADS 2009: 572-577 - [c30]Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan, Kenneth Tse:
A Model for Foxy Peer-to-Peer Network Investigations. IFIP Int. Conf. Digital Forensics 2009: 175-186 - [c29]Richard E. Overill, Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law:
A Cost-Effective Model for Digital Forensic Investigations. IFIP Int. Conf. Digital Forensics 2009: 231-240 - [c28]Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law, Hayson Tse:
Analysis of the Digital Evidence Presented in the Yahoo! Case. IFIP Int. Conf. Digital Forensics 2009: 241-252 - 2008
- [c27]Michael Y. K. Kwan, Kam-Pui Chow, Frank Y. W. Law, Pierre K. Y. Lai:
Reasoning About Evidence Using Bayesian Networks. IFIP Int. Conf. Digital Forensics 2008: 275-289 - [c26]Frank Y. W. Law, Pierre K. Y. Lai, Zoe Lin Jiang, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, C. F. Chong:
Protecting Digital Legal Professional Privilege (LPP) Data. SADFE 2008: 91-101 - 2007
- [j7]Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme. Int. J. Netw. Secur. 5(2): 220-223 (2007) - [c25]Frank Y. W. Law, Kam-Pui Chow, Michael Y. K. Kwan, Pierre K. Y. Lai:
Consistency Issue on Live Systems Forensics. FGCN (2) 2007: 136-140 - [c24]Zoe Lin Jiang, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu, Pierre K. Y. Lai:
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. FGCN (2) 2007: 141-145 - [c23]Jacky S.-C. Yuk, Kwan-Yee Kenneth Wong, Ronald H. Y. Chung, Kam-Pui Chow, Francis Y. L. Chin, Kenneth S. H. Tsang:
Object-Based Surveillance Video Retrieval System with Real-Time Indexing Methodology. ICIAR 2007: 626-637 - [c22]Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). ISPEC 2007: 11-19 - [c21]Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:
A Hybrid Approach for Authenticating MPEG-2 Streaming Data. MCAM 2007: 203-212 - [c20]Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan, Pierre K. Y. Lai:
The Rules of Time on NTFS File System. SADFE 2007: 71-85 - [c19]X. He, N. H. C. Yung, Kam-Pui Chow, Francis Y. L. Chin, Ronald H. Y. Chung, Kwan-Yee Kenneth Wong, Kenneth S. H. Tsang:
Watershed segmentation with boundary curvature ratio based merging criterion. SIP 2007: 7-12 - 2006
- [j6]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Practical electronic lotteries with offline TTP. Comput. Commun. 29(15): 2830-2840 (2006) - [j5]Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, S. K. Ip, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Siu-Ming Yiu, Kwun Yin Yu, W. Ju:
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed. IEEE J. Sel. Areas Commun. 24(10): 1889-1900 (2006) - [c18]Pierre K. Y. Lai, Siu-Ming Yiu, Kam-Pui Chow, C. F. Chong, Lucas Chi Kwong Hui:
An Efficient Bloom Filter Based Solution for Multiparty Private Matching. Security and Management 2006: 286-292 - [c17]Jacky S.-C. Yuk, Kwan-Yee Kenneth Wong, Ronald H. Y. Chung, Francis Y. L. Chin, Kam-Pui Chow:
Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers. ISDA (2) 2006: 384-389 - 2005
- [j4]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Forward-secure multisignature and blind signature schemes. Appl. Math. Comput. 168(2): 895-908 (2005) - [j3]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Richard W. C. Lui:
A generic anti-spyware solution by access control list at kernel level. J. Syst. Softw. 75(1-2): 227-234 (2005) - [c16]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. ACISP 2005: 316-328 - [c15]Yan Woo, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:
Dynamic Integrity Verification for Software Self-defense. Security and Management 2005: 327-333 - [c14]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
An e-Lottery Scheme Using Verifiable Random Function. ICCSA (3) 2005: 651-660 - [c13]Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. ICPADS (2) 2005: 275-279 - [c12]Ronald H. Y. Chung, Francis Y. L. Chin, Kwan-Yee Kenneth Wong, Kam-Pui Chow, Tao Luo, Henry S. K. Fung:
Efficient Block-based Motion Segmentation Method using Motion Vector Consistency. MVA 2005: 550-553 - [c11]Kam-Pui Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan:
Digital Evidence Search Kit. SADFE 2005: 187-194 - [c10]Ai Fen Sui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. WCNC 2005: 2088-2093 - 2004
- [c9]Wai Wan Tsang, Lucas Chi Kwong Hui, Kam-Pui Chow, C. F. Chong, Sam C. W. Tso:
Tuning the Collision Test for Power. ACSC 2004: 23-30 - [c8]Lucas Chi Kwong Hui, Kam-Pui Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan:
Risk Management of Corporate Confidential Information in Digital Form. COMPSAC 2004: 88-89 - [c7]Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong:
Delegation of signing and decryption rights using pki proxy memo. IASTED Conf. on Software Engineering 2004: 281-285 - [c6]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Secure Hierarchical Identity Based Signature and Its Application. ICICS 2004: 480-494 - [c5]Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Kwun Yin Yu:
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. ISPAN 2004: 581-586 - [i3]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2004: 108 (2004) - [i2]Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. IACR Cryptol. ePrint Arch. 2004: 322 (2004) - 2003
- [c4]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ICISC 2003: 352-369 - [i1]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
A Secure Modified ID-Based Undeniable Signature Scheme. IACR Cryptol. ePrint Arch. 2003: 262 (2003) - 2001
- [j2]Z. C. Li, Lucas Chi Kwong Hui, Kam-Pui Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan:
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers. Inf. Process. Lett. 80(6): 295-298 (2001) - 2000
- [j1]Zichen Li, Lucas Chi Kwong Hui, Kam-Pui Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan:
Security of Tseng-Jan's group signature schemes. Inf. Process. Lett. 75(5): 187-189 (2000) - [c3]Xiaoyun Wang, Lucas Chi Kwong Hui, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan:
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000: 167-177
1990 – 1999
- 1997
- [c2]Kam-Pui Chow, M. Perett:
Airport Counter Allocation Using Constraint Logic Programming. PACT 1997: 107-116 - 1996
- [c1]Kam-Pui Chow, Tak Wah Tak Wah, Ka Hing Lee:
The Telephone Directory Enquiry System of Hong Kong. APSEC 1996: 268-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-15 23:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint