关注
David K Y Yau
标题
引用次数
引用次数
年份
Automatic Image Segmentation by Integrating Color-Edge Extraction and Seeded Region Growing
J Fan, DKY Yau, AK Elmagarmid, WG Aref
IEEE Transactions On Image Processing 10 (10), 1454-1466, 2001
9562001
Automatic Image Segmentation by Integrating Color-Edge Extraction and Seeded Region Growing
J Fan, DKY Yau, AK Elmagarmid, W Aref
IEEE transactions on image processing 10 (10), 2001
9512001
Energy provisioning in wireless rechargeable sensor networks
S He, J Chen, F Jiang, DKY Yau, G Xing, Y Sun
IEEE transactions on mobile computing 12 (10), 1931-1942, 2012
7472012
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
DKY Yau, JCS Lui, F Liang, Y Yam
IEEE/ACM Transactions On Networking 13 (1), 29-42, 2005
4632005
Privacy vulnerability of published anonymous mobility traces
CYT Ma, DKY Yau, NK Yip, NSV Rao
Proceedings of the sixteenth annual international conference on Mobile …, 2010
3142010
Defending against low-rate TCP attacks: Dynamic detection and protection
H Sun, JCS Lui, DKY Yau
Proceedings of the 12th IEEE International Conference on Network Protocols …, 2004
2272004
Defending against low-rate TCP attacks: Dynamic detection and protection
H Sun, JCS Lui, DKY Yau
Proceedings of the 12th IEEE International Conference on Network Protocols …, 2004
2272004
Incentive and service differentiation in P2P networks: a game theoretic approach
RTB Ma, SCM Lee, JCS Lui, DKY Yau
Ieee/ACM Transactions on networking 14 (5), 978-991, 2006
2252006
Incentive and service differentiation in P2P networks: a game theoretic approach
RTB Ma, SCM Lee, JCS Lui, DKY Yau
Ieee/ACM Transactions on networking 14 (5), 978-991, 2006
2252006
Modeling and mitigating impact of false data injection attacks on automatic generation control
R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi
IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017
2062017
Modeling and mitigating impact of false data injection attacks on automatic generation control
R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi
IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017
2062017
Modeling and mitigating impact of false data injection attacks on automatic generation control
R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi
IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017
2062017
Cross-layer optimization of correlated data gathering in wireless sensor networks
S He, J Chen, DKY Yau, Y Sun
IEEE Transactions on Mobile Computing 11 (11), 1678-1691, 2011
2022011
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu
IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018
2012018
An algorithm for lossless smoothing of MPEG video
SS Lam, S Chow, DKY Yau
ACM SIGCOMM Computer Communication Review 24 (4), 281-293, 1994
1971994
An algorithm for lossless smoothing of MPEG video
SS Lam, S Chow, DKY Yau
ACM SIGCOMM Computer Communication Review 24 (4), 281-293, 1994
1971994
A game theoretic approach to provide incentive and service differentiation in P2P networks
RTB Ma, S Lee, J Lui, DKY Yau
ACM SIGMETRICS Performance Evaluation Review 32 (1), 189-198, 2004
1862004
Adaptive rate-controlled scheduling for multimedia applications
DKY Yau, SS Lam
Proceedings of the fourth ACM international conference on multimedia, 129-140, 1997
1551997
A hybrid architecture for cost-effective on-demand media streaming
MM Hefeeda, BK Bhargava, DKY Yau
Computer Networks 44 (3), 353-382, 2004
1332004
Markov game analysis for attack-defense of power networks under possible misinformation
CYT Ma, DKY Yau, X Lou, NSV Rao
IEEE Transactions on Power Systems 28 (2), 1676-1686, 2012
1312012
系统目前无法执行此操作,请稍后再试。
文章 1–20