Securing android: a survey, taxonomy, and challenges DJJ Tan, TW Chua, VLL Thing ACM Computing Surveys (CSUR) 47 (4), 58, 2015 | 200* | 2015 |
Twenty years of digital audio watermarking—a comprehensive review G Hua, J Huang, YQ Shi, J Goh, VLL Thing Signal Processing 128, 222-242, 2016 | 187 | 2016 |
IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach VLL Thing Wireless Communications and Networking Conference (WCNC), 2017 IEEE, 1-6, 2017 | 177 | 2017 |
Autonomous Vehicle Security: A Taxonomy of Attacks and Defences VLL Thing, J Wu Internet of Things (iThings) and IEEE Green Computing and Communications …, 2016 | 176 | 2016 |
Image Region Forgery Detection: A Deep Learning Approach Y Zhang, LL Win, J Goh, VLL Thing Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber …, 2016 | 173 | 2016 |
Port hopping for resilient networks HCJ Lee, VLL Thing IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3291-3295, 2004 | 158 | 2004 |
Live memory forensics of mobile phones VLL Thing, KY Ng, EC Chang digital investigation 7, S74-S82, 2010 | 154 | 2010 |
A survey on image tampering and its detection in real-world photos L Zheng, Y Zhang, VLL Thing Journal of Visual Communication and Image Representation 58, 380-399, 2019 | 135 | 2019 |
Automated face swapping and its detection Y Zhang, L Zheng, VLL Thing Signal and Image Processing (ICSIP), 2017 IEEE 2nd International Conference …, 2017 | 107 | 2017 |
ICMP traceback with cumulative path, an efficient solution for IP traceback HCJ Lee, VLL Thing, Y Xu, M Ma International Conference on Information and Communications Security, 124-135, 2003 | 97 | 2003 |
Fingerprint liveness detection from single image using low-level features and shape analysis RK Dubey, J Goh, VLL Thing IEEE Transactions on Information Forensics and Security 11 (7), 1461-1475, 2016 | 78 | 2016 |
A survey of bots used for distributed denial of service attacks VL Thing, M Sloman, N Dulay IFIP International Information Security Conference, 229-240, 2007 | 77 | 2007 |
Time-spread echo-based audio watermarking with optimized imperceptibility and robustness G Hua, J Goh, VLL Thing IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP) 23 (2 …, 2015 | 76 | 2015 |
Biff: A blockchain-based iot forensics framework with identity privacy DP Le, H Meng, L Su, SL Yeo, V Thing TENCON 2018-2018 IEEE Region 10 Conference, 2372-2377, 2018 | 74 | 2018 |
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu International Conference on Advanced Data Mining and Applications, 727-740, 2017 | 70 | 2017 |
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic I Nevat, DM Divakaran, SG Nagarajan, P Zhang, L Su, LL Ko, VLL Thing IEEE/ACM Transactions on Networking (TON) 26 (1), 131-144, 2018 | 69 | 2018 |
Control flow obfuscation for Android applications V Balachandran, DJJ Tan, VLL Thing Computers & Security 61, 72-93, 2016 | 62 | 2016 |
A scalable and extensible framework for android malware detection and family attribution L Zhang, VLL Thing, Y Cheng Computers & Security 80, 120-133, 2019 | 58 | 2019 |
Bandwidth-efficient WDM channel allocation for four-wave mixing-effect minimization VLL Thing, P Shum, MK Rao IEEE Transactions on Communications 52 (12), 2184-2189, 2004 | 57 | 2004 |
A local mobility agent selection algorithm for mobile networks Y Xu, HCJ Lee, VLL Thing IEEE International Conference on Communications, 2003. ICC'03. 2, 1074-1079, 2003 | 57 | 2003 |