Co-Authors
AuthorsNo. of Publications
yiu, sm 45
hui, lck 36
chong, cf 25
tsang, ww 22
chan, hw 21
hui, ck 16
lai, pky 15
pun, kh 13
chung, rhy 12
kwan, myk 12
law, fyw 10
chow, ssm 8
fang, j 7
jiang, zl 7
chin, fyl 6
ieong, rsc 6
kwan, yk 6
luo, t 6
wong, kyk 6
yuk, sc 6
ieong, r 5
lai, ky 5
lai, p 5
tang, y 5
tse, hks 5
wong, kky 5
xu, f 5
yang, m 5
yau, kk 5
chan, psv 4
chan, vps 4
he, x 4
hui, l 4
kwan, m 4
law, yw 4
overill, re 4
tse, h 4
wang, x 4
chan, km 3
chan, rcb 3
chen, l 3
fan, x 3
fang, jb 3
law, f 3
niu, x 3
silomon, jam 3
tse, kwh 3
wang, m 3
yau, kkk 3
yuk, jsc 3
chan, eyk 2
chan, pf 2
chanson, st 2
chen, z 2
chung, hy 2
han, q 2
he, mf 2
he, xc 2
hon, wk 2
hou, s 2
hou, sh 2
hui, akt 2
ieong, scr 2
ip, sk 2
jiang, l 2
lai, ym 2
lam, tw 2
lau, wc 2
li, z 2
li, zc 2
overill, r 2
silomon, j 2
sui, af 2
tan, z 2
tang, b 2
tsang, ksh 2
tse, ksh 2
tse, whk 2
tso, cw 2
uehara, t 2
wu, x 2
yang, y 2
yeung, dy 2
yu, ky 2
zhang, p 2
zheng, x 2
zhou, g 2
zhu, d 2
berry, daniel m 1
chan, cb 1
chan, cf 1
chan, h 1
chan, p 1
chan, ps 1
chan, yk 1
chau, py 1
chen, j 1
chen, xj 1
cheng, ky 1
cheng, q 1
cheung, asy 1
cheung, b. 1
cheung, bsn 1
cheung, ls 1
cheung, mh 1
cheung, mmh 1
cheung, sn 1
cotton, jw 1
fan, xx 1
feng, b 1
fong, g 1
fung, hsk 1
he, j 1
he, y 1
hong, p 1
hui, m 1
hung, ct 1
hung, hf 1
im, swk 1
ip, chokho 1
ju, w 1
lam, ck 1
lam, lck 1
lee, ck 1
lee, kh 1
li, f 1
li, fkf 1
li, n 1
li, q 1
li, y 1
liang, y 1
lu, k 1
lu, z 1
lui, rwc 1
ma, sk 1
mai, yh 1
man, ly 1
peng, b 1
perett, m 1
pun, kkh 1
qin, j 1
qin, s 1
rashed, m 1
shao, w 1
shen, a 1
sheng, mm 1
shenoi, s 1
shi, jq 1
tang, j 1
tsang, ayf 1
tsang, yf 1
tseung, cy 1
tso, scw 1
tu, w 1
wang, c 1
wang, ek 1
wang, t 1
weber, rh 1
woo, y 1
wu, qy 1
xu, j 1
xu, r 1
xu, rs 1
xu, x 1
ye, y 1
ye, ym 1
yeung, p 1
yin, w 1
yiu, s 1
yong, amk 1
yong, mk 1
yung, nhc 1
zhang, x 1
zhu, q 1
View More
Keywords in Publications
keywordsNo. of Authors
distributed denial-of-service (ddos) 7
intrusion detection 7
routers 7
testbed 7
cryptography 6
boundary smoothness 5
cryptanalysis 5
de-interlacing methods 5
edge dependent interpolation 5
group signature 5
merging criterion 5
motion adaptive interpolation 5
optimal number of segments 5
watershed segmentation 5
bloom filter 4
computer forensics 4
computer networks 4
contour measurement 4
database operation 4
database systems 4
decentralized control 4
digital arithmetic 4
digital forensic engineering 4
edge detection 4
electronic crime countermeasures 4
forensic analysis 4
homomorphic encryption 4
indexing (of information) 4
multiparty matching 4
object-based retrieval system 4
privacy 4
probabilistic logics 4
real time systems 4
sensor networks 4
systematic approaches 4
text-based matching 4
3-dimension hashing 3
actuation 3
applied cryptography 3
bilinear pairings 3
bittorrent model 3
blind signature 3
chinese shanzhai phones 3
cloud forensics 3
cloudfront 3
combinatorial group testing (cgt) 3
commutative encryption 3
computing technology 3
confidential forensic investigation 3
context-aware 3
cryptographic primitives 3
cyber-physical system 3
datamining 3
deblurring 3
deleted data 3
digital crimes 3
digital evidence 3
e-lottery 3
elliptic curve cryptosystems 3
face model 3
face reconstruction 3
file carving 3
file sharing 3
firewalls 3
forensic investigation 3
forensics technology 3
forward security 3
forward-secure signature 3
hard disk integrity 3
hard disk sector allocation 3
hierarchical identity-based signature 3
identity-based partially blind signature 3
identity-based signcryption 3
initial seeders 3
integrity verification 3
internet forum 3
internet piracy 3
internet surveillance 3
k-dimensional hashing 3
keyword clustering 3
latent sector errors (lses) 3
legal professional privilege (lpp) 3
live forensics 3
mediatek 3
memory analysis 3
motion estimation 3
multisignature 3
network security 3
peer to peer 3
phonebook 3
photo forensics 3
pose estimation 3
privacy preserving forensics 3
privacy-preserving multiple keyword search 3
provable security 3
public ciphertext authenticity 3
public key cryptosystems 3
public verifiability 3
remote forensics 3
search on encrypted data 3
security 3
self-defense 3
semantical security 3
shanzhai mobile phone 3
similarity measure 3
spatially varing blur kernels 3
super-resolution 3
tamper proofing 3
texture mapping 3
threshold partially blind signature 3
tracking 3
user profiling 3
verifiable random function 3
virus detection 3
volatile data 3
web crawler 3
audio 2
binding corporate rules 2
block cipher 2
cast-128 2
computer programming 2
computers 2
data controllers and data processors 2
data privacy 2
data protection 2
data security 2
differential cryptanalysis 2
digital forensics 2
digital investigation 2
forensics 2
foxmail 2
incident response 2
industrial control systems 2
instant message 2
internet applications 2
machine learning 2
msn 2
one-class svm 2
protection of personaldata 2
qq 2
smartphone 2
software computers 2
temporal aligned selection 2
trans-border data transfer 2
video stitching 2
voice chat 2
water treatment system 2
weak key 2
006.35 c52 1
495.13028 c5 1
analysis 1
animals 1
bayesian network 1
bayesian networks 1
bayesian posterior probability 1
behavior analysis 1
business model 1
chinese language -- dictionaries. 1
civil unrest 1
cloud storage ecosystem 1
competing hypotheses 1
computer crime 1
computer crimes - prevention. 1
computer crimes. 1
computer model 1
computer security. 1
computer technology 1
control systems 1
covid-19 sensing 1
criminal profiling 1
cross infection - transmission 1
cyber attacks 1
cyberlocker 1
cyberlockers 1
cybersecurity 1
data mining 1
digital forensic hypotheses 1
digital forensic investigation 1
discussion forums 1
disinfection 1
electronic evidence 1
evidential probability 1
evidentiary reasoning 1
fat 1
file system analysis 1
first seeder 1
flash mob organizers 1
forensic perspective 1
forensic sciences. 1
forensics tools 1
foxy 1
foxy network 1
gnutella 2 protocol 1
green dam youth escort 1
humans 1
hypotheses 1
identity tracking 1
infant 1
information extraction 1
information retrieval 1
initial seeder 1
international standards 1
internet auction fraud 1
internet crimes 1
investigation model 1
knowledge extraction 1
knowledge graph 1
knowledge graph reasoning 1
ladder logic programming 1
learning (artificial intelligence) 1
memory acquisition 1
memory forensics 1
mice 1
mobile telephone 1
multilayer perceptrons 1
named entity recognition 1
natural language processing 1
natural language processing (computer science) 1
network simulation 1
occupy central campaign 1
odds 1
operational complexity model 1
peer-to-peer network forensics 1
peer-to-peer networks 1
piracy 1
plc forensics 1
political events 1
possession of child pornography 1
predictive modeling 1
privacy preservation 1
privacy protection 1
probability 1
probability theory 1
programmable logic controllers 1
public health 1
quantification of plausibility 1
real-name registration 1
reasoning 1
rectum 1
relation extraction 1
relevance of evidence 1
salmonella infections - transmission 1
scada security 1
science and law 1
sensitivity analysis 1
sentiment classification 1
social media in china 1
social media platform 1
storage media 1
taxonomy 1
thermometers 1
time analysis 1
vulnerability 1
yahoo! case 1
View More