关注
Vrizlynn Thing
Vrizlynn Thing
未知所在单位机构
在 alumni.imperial.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Securing android: a survey, taxonomy, and challenges
DJJ Tan, TW Chua, VLL Thing
ACM Computing Surveys (CSUR) 47 (4), 58, 2015
200*2015
Twenty years of digital audio watermarking—a comprehensive review
G Hua, J Huang, YQ Shi, J Goh, VLL Thing
Signal Processing 128, 222-242, 2016
1872016
IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach
VLL Thing
Wireless Communications and Networking Conference (WCNC), 2017 IEEE, 1-6, 2017
1772017
Autonomous Vehicle Security: A Taxonomy of Attacks and Defences
VLL Thing, J Wu
Internet of Things (iThings) and IEEE Green Computing and Communications …, 2016
1762016
Image Region Forgery Detection: A Deep Learning Approach
Y Zhang, LL Win, J Goh, VLL Thing
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber …, 2016
1732016
Port hopping for resilient networks
HCJ Lee, VLL Thing
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3291-3295, 2004
1582004
Live memory forensics of mobile phones
VLL Thing, KY Ng, EC Chang
digital investigation 7, S74-S82, 2010
1542010
A survey on image tampering and its detection in real-world photos
L Zheng, Y Zhang, VLL Thing
Journal of Visual Communication and Image Representation 58, 380-399, 2019
1352019
Automated face swapping and its detection
Y Zhang, L Zheng, VLL Thing
Signal and Image Processing (ICSIP), 2017 IEEE 2nd International Conference …, 2017
1072017
ICMP traceback with cumulative path, an efficient solution for IP traceback
HCJ Lee, VLL Thing, Y Xu, M Ma
International Conference on Information and Communications Security, 124-135, 2003
972003
Fingerprint liveness detection from single image using low-level features and shape analysis
RK Dubey, J Goh, VLL Thing
IEEE Transactions on Information Forensics and Security 11 (7), 1461-1475, 2016
782016
A survey of bots used for distributed denial of service attacks
VL Thing, M Sloman, N Dulay
IFIP International Information Security Conference, 229-240, 2007
772007
Time-spread echo-based audio watermarking with optimized imperceptibility and robustness
G Hua, J Goh, VLL Thing
IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP) 23 (2 …, 2015
762015
Biff: A blockchain-based iot forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE Region 10 Conference, 2372-2377, 2018
742018
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
International Conference on Advanced Data Mining and Applications, 727-740, 2017
702017
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic
I Nevat, DM Divakaran, SG Nagarajan, P Zhang, L Su, LL Ko, VLL Thing
IEEE/ACM Transactions on Networking (TON) 26 (1), 131-144, 2018
692018
Control flow obfuscation for Android applications
V Balachandran, DJJ Tan, VLL Thing
Computers & Security 61, 72-93, 2016
622016
A scalable and extensible framework for android malware detection and family attribution
L Zhang, VLL Thing, Y Cheng
Computers & Security 80, 120-133, 2019
582019
Bandwidth-efficient WDM channel allocation for four-wave mixing-effect minimization
VLL Thing, P Shum, MK Rao
IEEE Transactions on Communications 52 (12), 2184-2189, 2004
572004
A local mobility agent selection algorithm for mobile networks
Y Xu, HCJ Lee, VLL Thing
IEEE International Conference on Communications, 2003. ICC'03. 2, 1074-1079, 2003
572003
系统目前无法执行此操作,请稍后再试。
文章 1–20