Volgen
Vrizlynn Thing
Vrizlynn Thing
Onbekend partnerschap
Geverifieerd e-mailadres voor ieee.org - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Autonomous Vehicle Security: A Taxonomy of Attacks and Defences
VLL Thing, J Wu
Internet of Things (iThings) and IEEE Green Computing and Communications …, 2016
2292016
Twenty years of digital audio watermarking—a comprehensive review
G Hua, J Huang, YQ Shi, J Goh, VLL Thing
Signal Processing 128, 222-242, 2016
2212016
Securing android: a survey, taxonomy, and challenges
DJJ Tan, TW Chua, VLL Thing
ACM Computing Surveys (CSUR) 47 (4), 58, 2015
221*2015
Image Region Forgery Detection: A Deep Learning Approach
Y Zhang, LL Win, J Goh, VLL Thing
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber …, 2016
2172016
IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach
VLL Thing
Wireless Communications and Networking Conference (WCNC), 2017 IEEE, 1-6, 2017
2082017
A survey on image tampering and its detection in real-world photos
L Zheng, Y Zhang, VLL Thing
Journal of Visual Communication and Image Representation 58, 380-399, 2019
1932019
Port hopping for resilient networks
HCJ Lee, VLL Thing
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3291-3295, 2004
1682004
Automated face swapping and its detection
Y Zhang, L Zheng, VLL Thing
Signal and Image Processing (ICSIP), 2017 IEEE 2nd International Conference …, 2017
1642017
Live memory forensics of mobile phones
VLL Thing, KY Ng, EC Chang
digital investigation 7, S74-S82, 2010
1632010
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study
Z Wang, KW Fok, VLL Thing
Computers & Security 113, 102542, 2022
1032022
Biff: A blockchain-based iot forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE Region 10 Conference, 2372-2377, 2018
1032018
ICMP traceback with cumulative path, an efficient solution for IP traceback
HCJ Lee, VLL Thing, Y Xu, M Ma
International Conference on Information and Communications Security, 124-135, 2003
982003
Fingerprint liveness detection from single image using low-level features and shape analysis
RK Dubey, J Goh, VLL Thing
IEEE Transactions on Information Forensics and Security 11 (7), 1461-1475, 2016
932016
Three Decades of Deception Techniques in Active Cyber Defense-Retrospect and Outlook
L Zhang, VLL Thing
Computers & Security, 102288, 2021
902021
Time-spread echo-based audio watermarking with optimized imperceptibility and robustness
G Hua, J Goh, VLL Thing
IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP) 23 (2 …, 2015
862015
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
International Conference on Advanced Data Mining and Applications, 727-740, 2017
812017
Control flow obfuscation for Android applications
V Balachandran, DJJ Tan, VLL Thing
Computers & Security 61, 72-93, 2016
812016
Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment
BS Lim, SL Keoh, VLL Thing
802018
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic
I Nevat, DM Divakaran, SG Nagarajan, P Zhang, L Su, LL Ko, VLL Thing
IEEE/ACM Transactions on Networking (TON) 26 (1), 131-144, 2018
782018
A survey of bots used for distributed denial of service attacks
VL Thing, M Sloman, N Dulay
IFIP International Information Security Conference, 229-240, 2007
762007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20