Autonomous Vehicle Security: A Taxonomy of Attacks and Defences VLL Thing, J Wu Internet of Things (iThings) and IEEE Green Computing and Communications …, 2016 | 230 | 2016 |
Twenty years of digital audio watermarking—a comprehensive review G Hua, J Huang, YQ Shi, J Goh, VLL Thing Signal Processing 128, 222-242, 2016 | 227 | 2016 |
Image Region Forgery Detection: A Deep Learning Approach Y Zhang, LL Win, J Goh, VLL Thing Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber …, 2016 | 221 | 2016 |
Securing android: a survey, taxonomy, and challenges DJJ Tan, TW Chua, VLL Thing ACM Computing Surveys (CSUR) 47 (4), 58, 2015 | 217* | 2015 |
IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach VLL Thing Wireless Communications and Networking Conference (WCNC), 2017 IEEE, 1-6, 2017 | 209 | 2017 |
A survey on image tampering and its detection in real-world photos L Zheng, Y Zhang, VLL Thing Journal of Visual Communication and Image Representation 58, 380-399, 2019 | 193 | 2019 |
Port hopping for resilient networks HCJ Lee, VLL Thing IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3291-3295, 2004 | 167 | 2004 |
Live memory forensics of mobile phones VLL Thing, KY Ng, EC Chang digital investigation 7, S74-S82, 2010 | 164 | 2010 |
Automated face swapping and its detection Y Zhang, L Zheng, VLL Thing Signal and Image Processing (ICSIP), 2017 IEEE 2nd International Conference …, 2017 | 162 | 2017 |
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study Z Wang, KW Fok, VLL Thing Computers & Security 113, 102542, 2022 | 104 | 2022 |
ICMP traceback with cumulative path, an efficient solution for IP traceback HCJ Lee, VLL Thing, Y Xu, M Ma International Conference on Information and Communications Security, 124-135, 2003 | 101 | 2003 |
Biff: A blockchain-based iot forensics framework with identity privacy DP Le, H Meng, L Su, SL Yeo, V Thing TENCON 2018-2018 IEEE Region 10 Conference, 2372-2377, 2018 | 99 | 2018 |
Fingerprint liveness detection from single image using low-level features and shape analysis RK Dubey, J Goh, VLL Thing IEEE Transactions on Information Forensics and Security 11 (7), 1461-1475, 2016 | 90 | 2016 |
Three Decades of Deception Techniques in Active Cyber Defense-Retrospect and Outlook L Zhang, VLL Thing Computers & Security, 102288, 2021 | 89 | 2021 |
Time-spread echo-based audio watermarking with optimized imperceptibility and robustness G Hua, J Goh, VLL Thing IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP) 23 (2 …, 2015 | 88 | 2015 |
Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment BS Lim, SL Keoh, VLL Thing | 81 | 2018 |
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu International Conference on Advanced Data Mining and Applications, 727-740, 2017 | 81 | 2017 |
Control flow obfuscation for Android applications V Balachandran, DJJ Tan, VLL Thing Computers & Security 61, 72-93, 2016 | 81 | 2016 |
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic I Nevat, DM Divakaran, SG Nagarajan, P Zhang, L Su, LL Ko, VLL Thing IEEE/ACM Transactions on Networking (TON) 26 (1), 131-144, 2018 | 78 | 2018 |
A survey of bots used for distributed denial of service attacks VL Thing, M Sloman, N Dulay IFIP International Information Security Conference, 229-240, 2007 | 76 | 2007 |