default search action
Brian King
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Pin-Jui Ku, I-Fan Chen, Chao-Han Huck Yang, Anirudh Raju, Pranav Dheram, Pegah Ghahremani, Brian King, Jing Liu, Roger Ren, Phani Sankar Nidadavolu:
Hot-Fixing Wake Word Recognition for End-to-End ASR Via Neural Model Reprogramming. ICASSP 2024: 10816-10820 - [c42]Zhitong He, Yiyang Guo, Yaobin Chen, Brian King, Lingxi Li:
Risk Analysis in Vehicle and Electric Scooter Interaction. IV 2024: 1316-1322 - 2023
- [c41]Avinash Prabu, Lingxi Li, Yaobin Chen, Brian King:
Data-driven Deep Reinforcement Learning for Automated Driving. ITSC 2023: 3790-3795 - 2022
- [j13]Asaf Tzachor, Medha Devare, Brian King, Shahar Avin, Seán Ó hÉigeartaigh:
Responsible artificial intelligence in agriculture requires systemic understanding of risks and externalities. Nat. Mach. Intell. 4(2): 104-109 (2022) - [c40]Pranav Dheram, Murugesan Ramakrishnan, Anirudh Raju, I-Fan Chen, Brian King, Katherine Powell, Melissa Saboowala, Karan Shetty, Andreas Stolcke:
Toward Fairness in Speech Recognition: Discovery and mitigation of performance disparities. INTERSPEECH 2022: 1268-1272 - [i3]Pranav Dheram, Murugesan Ramakrishnan, Anirudh Raju, I-Fan Chen, Brian King, Katherine Powell, Melissa Saboowala, Karan Shetty, Andreas Stolcke:
Toward Fairness in Speech Recognition: Discovery and mitigation of performance disparities. CoRR abs/2207.11345 (2022) - [i2]Avinash Prabu, Lingxi Li, Brian King, Yaobin Chen:
A Method for Crash Prediction and Avoidance Using Hidden Markov Models. CoRR abs/2212.12011 (2022) - 2021
- [i1]I-Fan Chen, Brian King, Jasha Droppo:
Investigation of Training Label Error Impact on RNN-T. CoRR abs/2112.00350 (2021) - 2020
- [j12]Elizabeth Arnaud, Marie-Angélique Laporte, Soonho Kim, Céline Aubert, Sabina Leonelli, Berta Miro, Laurel Cooper, Pankaj Jaiswal, Gideon Kruseman, Rosemary Shrestha, Pier Luigi Buttigieg, Christopher J. Mungall, Julian Pietragalla, Afolabi Agbona, Jacqueline Muliro, Jeffrey Detras, Vilma Hualla, Abhishek Rathore, Roma Rani Das, Ibnou Dieng, Guillaume Bauchet, Naama Menda, Cyril Pommier, Felix Shaw, David Lyon, Leroy Mwanzia, Henry Juarez, Enrico Bonaiuti, Brian Chiputwa, Oluremi Olatunbosun, Sandrine Auzoux, Esther Dzalé Yeumo, Lukas A. Mueller, Kevin A. T. Silverstein, Alexandra Lafargue, Erick Antezana, Medha Devare, Brian King:
The Ontologies Community of Practice: A CGIAR Initiative for Big Data in Agrifood Systems. Patterns 1(7): 100105 (2020) - [c39]Carrie Pirmann, Bhagawat Acharya, Brian King, Katherine Mary Faull:
Training Algorithms to Read Complex Collections: Handwriting Classification for Improved HTR Models. DH 2020
2010 – 2019
- 2019
- [c38]Avinash Prabu, Lingxi Li, Brian King, Yaobin Chen:
A Method for Crash Prediction and Avoidance Using Hidden Markov Models. SOLI 2019: 146-151 - 2018
- [c37]Zhijie Li, Haoyan Wu, Brian King, Zina Ben Miled, John Wassick, Jeffrey Tazelaar:
A Hybrid Blockchain Ledger for Supply Chain Visibility. ISPDC 2018: 118-125 - 2017
- [j11]Feng Jiang, Brian King:
A novel quality assessment for visual secret sharing schemes. EURASIP J. Inf. Secur. 2017: 1 (2017) - [j10]Feng Jiang, Paul Salama, Brian King:
A Public-Key Approach of Selective Encryption for Images. Int. J. Netw. Secur. 19(1): 118-126 (2017) - [j9]Haoyan Wu, Zhijie Li, Brian King, Zina Ben Miled, John Wassick, Jeffrey Tazelaar:
A Distributed Ledger for Supply Chain Physical Distribution Visibility. Inf. 8(4): 137 (2017) - [c36]Alex Yang-chan Hsu, Brian King, Dan Wang, Dimitrios Buhalis:
Entrepreneurship in the Contemporary Tourism Ecosystem: The Case of Incoming Tour Operators in Taiwan. ENTER 2017: 101-113 - [c35]Zhijie Li, Haoyan Wu, Brian King, Zina Ben Miled, John Wassick, Jeffrey Tazelaar:
On the Integration of Event-Based and Transaction-Based Architectures for Supply Chains. ICDCS Workshops 2017: 376-382 - 2016
- [j8]Alex Yang-chan Hsu, Brian King, Dan Wang, Dimitrios Buhalis:
In-destination tour products and the disrupted tourism industry: progress and prospects. J. Inf. Technol. Tour. 16(4): 413-433 (2016) - 2015
- [j7]Brian King:
A Dynamic Threshold Decryption Scheme Using Bilinear Pairings. Int. J. Netw. Secur. 17(6): 771-778 (2015) - 2013
- [c34]Brian King, Alan Fern, Jesse Hostetler:
On Adversarial Policy Switching with Experiments in Real-Time Strategy Games. ICAPS 2013 - [c33]Jie Ling, Brian King:
Smart card fault attacks on elliptic curve cryptography. MWSCAS 2013: 1255-1258 - 2012
- [j6]An Feng, Michael Knieser, Maher E. Rizkalla, Brian King, Paul Salama, Francis Bowen:
Embedded system for sensor communication and security. IET Inf. Secur. 6(2): 111-121 (2012) - [c32]Samuel Assegie, Saharnaz ZareAfifi, Romil Verma, Brian King, Paul Salama, Dongsoo S. Kim:
Quality assessment tests to be used in a wireless image sensor network. EIT 2012: 1-6 - [c31]Brian King, Paris Smaragdis, Gautham J. Mysore:
Noise-robust dynamic time warping using PLCA features. ICASSP 2012: 1973-1976 - [c30]Brian King, Cédric Févotte, Paris Smaragdis:
Optimal cost function and magnitude power for NMF-based speech separation and music interpolation. MLSP 2012: 1-6 - [c29]Saharnaz ZareAfifi, Romil Verma, Brian King, Paul Salama, Dongsoo S. Kim:
Secure countermeasures to data aggregation attacks on sensor networks. MWSCAS 2012: 856-859 - 2011
- [j5]Brian King, Les Atlas:
Single-Channel Source Separation Using Complex Matrix Factorization. IEEE ACM Trans. Audio Speech Lang. Process. 19(8): 2591-2597 (2011) - [c28]Saba Jalal, Brian King:
A pairing based cryptographic anonymous authentication scheme. ICUIMC 2011: 32 - 2010
- [c27]Brian King, Les E. Atlas:
Single-channel source separation using simplified-training complex matrix factorization. ICASSP 2010: 4206-4209 - [c26]Samuel Assegie, Paul Salama, Brian King:
An Attack on Wavelet Tree Shuffling Encryption Schemes. SUComS 2010: 139-148
2000 – 2009
- 2009
- [j4]Brian King:
Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n). Int. J. Netw. Secur. 8(2): 169-176 (2009) - [c25]Saba Jalal, Brian King:
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents. Inscrypt 2009: 426-442 - [c24]Brian King:
A Simple Encryption Scheme for Binary Elliptic Curves. FGIT-SecTech 2009: 273-280 - 2008
- [j3]Xiaolan Joy Zhang, Brian King:
Security Requirements for RFID Computing Systems. Int. J. Netw. Secur. 6(2): 214-226 (2008) - [c23]Brian King:
wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. ACNS 2008: 429-445 - [c22]Yvo Desmedt, Brian King, Berry Schoenmakers:
Revisiting the Karnin, Greene and Hellman Bounds. ICITS 2008: 183-198 - 2007
- [j2]Xiaolan Joy Zhang, Brian King:
An Anti-Counterfeiting RFID Privacy Protection Protocol. J. Comput. Sci. Technol. 22(3): 438-448 (2007) - [j1]Sining Liu, Brian King, Wei Wang:
Hardware Organization to Achieve High-Speed Elliptic Curve Cryptography for Mobile Devices. Mob. Networks Appl. 12(4): 271-279 (2007) - [c21]Brian King, Xiaolan Joy Zhang:
Securing the Pharmaceutical Supply Chain using RFID. MUE 2007: 23-28 - 2006
- [c20]Sining Liu, Brian King, Wei Wang:
A CRT-RSA Algorithm Secure against Hardware Fault Attacks. DASC 2006: 51-60 - [c19]Sining Liu, Francis Bowen, Brian King, Wei Wang:
Elliptic curves cryptosystem implementation based on a look-up table sharing scheme. ISCAS 2006 - [c18]Tuo Shi, Brian King, Paul Salama:
Selective encryption for H.264/AVC video coding. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607217 - 2005
- [c17]Brian King:
An Efficient Implementation of a Threshold RSA Signature Scheme. ACISP 2005: 382-393 - [c16]Xiaolan Joy Zhang, Brian King:
Modeling RFID Security. CISC 2005: 75-90 - [c15]Elias Haddad, Brian King:
Anonymous Simple Secure M-Commerce Protocol. PSC 2005: 199-205 - [c14]Brian King, Yvo Desmedt:
Securing Abstention in an Electronic Legislature. HICSS 2005 - [c13]Xiaolan Joy Zhang, Brian King:
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. ISC 2005: 474-481 - [c12]Paul Salama, Brian King:
Efficient secure image transmission: compression integrated with encryption. Security, Steganography, and Watermarking of Multimedia Contents 2005: 47-58 - 2004
- [c11]Brian King, Ben Rubin:
Improvements to the Point Halving Algorithm. ACISP 2004: 262-276 - [c10]Brian King:
A Point Compression Method for Elliptic Curves Defined over GF(2 n). Public Key Cryptography 2004: 333-345 - 2003
- [c9]Brian King:
A Comment on Group Independent Threshold Sharing. WISA 2003: 425-441 - 2002
- [c8]Brian King:
Requirements for Group Independent Linear Threshold Secret Sharing Schemes. ACISP 2002: 89-106 - [c7]Yvo Desmedt, Brian King:
Verifiable Democracy a Protocol to Secure an Electronic Legislature. EGOV 2002: 460-463 - 2001
- [c6]Brian King:
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. ACISP 2001: 376-391 - [c5]Brian King:
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic. Selected Areas in Cryptography 2001: 134-150 - 2000
- [c4]Brian King:
Algorithms to Speed Up Computations in Threshold RSA. ACISP 2000: 443-456 - [c3]Brian King:
Improved Methods to Perform Threshold RSA. ASIACRYPT 2000: 359-372
1990 – 1999
- 1999
- [c2]Yvo Desmedt, Brian King:
Verifiable Democracy. Communications and Multimedia Security 1999: 53-70 - 1998
- [c1]Yvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa:
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. ACISP 1998: 391-402
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint