Co-Authors
AuthorsNo. of Publications
hui, lck 90
lam, tw 60
chow, kp 43
chin, fyl 38
leung, hcm 35
li, vok 28
hui, ck 26
sung, wk 26
chim, tw 24
chow, ssm 21
wong, tkf 20
cheung, dwl 16
jiang, zl 16
fang, j 14
ting, hf 13
li, r 12
hon, wk 11
peng, y 11
wang, y 11
chong, cf 10
dong, y 10
tsang, ww 10
yuen, th 10
cheung, dw 9
mamoulis, n 9
wang, j 9
chan, hw 8
li, y 8
liu, x 8
pun, kh 8
zhang, y 8
lai, pky 7
lui, rwc 7
wong, pwh 7
ye, y 7
yu, c 7
chan, hl 6
he, y 6
leung, ws 6
lin, mc 6
liu, b 6
liu, cm 6
luo, r 6
sadakane, k 6
sui, af 6
wong, t 6
xiong, h 6
chan, pf 5
chan, py 5
cui, x 5
go, hw 5
kung, hf 5
li, z 5
lian, w 5
smith, dk 5
tang, y 5
wang, x 5
yang, b 5
zhang, c 5
zhang, j 5
chan, ppf 4
cheung, bwy 4
fang, jb 4
hui, l 4
jia, y 4
jiang, l 4
lim, bl 4
niu, x 4
siu, mh 4
tam, sl 4
wang, ek 4
wang, l 4
wong, kf 4
wong, wk 4
yu, ky 4
zhu, x 4
chen, j 3
chen, y 3
cheung, b 3
cheung, bsn 3
he, yj 3
hou, sh 3
huang, s 3
jiang, z 3
kwan, myk 3
law, fyw 3
leung, sy 3
li, j 3
liu, z 3
shen, z 3
shi, y 3
sung, kwk 3
tsang, yh 3
uehara, t 3
wang, b 3
wong, ck 3
woo, y 3
yang, d 3
yang, w 3
yau, jck 3
zhan, q 3
zhang, h 3
zhang, p 3
au, mh 2
chan, tf 2
chen, l 2
cheng, s 2
cheung, jcl 2
chiu, ys 2
chow, sm 2
han, q 2
he, mf 2
he, z 2
ho, ws 2
hou, s 2
hsu, by 2
huang, q 2
ieong, r 2
ieong, rsc 2
jansson, j 2
kao, my 2
kristiansen, k 2
lai, ym 2
lam, tak wah 2
lee, lk 2
leung, cm 2
li, d 2
li, p 2
li, q 2
li, rq 2
li, yingrui 2
liang, c 2
liu, binghang 2
lu, n 2
lui, wc 2
luo, ruibang 2
peng, s 2
qin, j 2
qing, s 2
quan, g 2
rosenfeld, r 2
song, y 2
song, yq 2
sun, y 2
tam, a 2
tan, z 2
tang, b 2
wang, m 2
wijaya, e 2
wong, ds 2
wong, shy 2
wu, e 2
wu, e 2
xiang, cl 2
xiang, q 2
xie, y 2
xu, x 2
yang, h 2
yeung, cy 2
yuan, j 2
zhang, ep 2
zhang, q 2
zheng, x 2
zhou, b 2
zhou, g 2
an, n 1
bai, f 1
bai, y 1
bolund, l 1
bond, cs 1
bruford, mw 1
cai, j 1
cai, q 1
cai, yp 1
cao, j 1
castleden, i 1
cbow, ssm 1
chan, cf 1
chan, dtf 1
chan, eyk 1
chan, ft 1
chan, km 1
chan, kp 1
chan, p 1
chan, pck 1
chan, ps 1
chang, ky 1
chanson, st 1
che, cm 1
chen, jc 1
chen, k 1
chen, ty 1
chen, yanxiang 1
chen, z 1
cheng, ky 1
cheng, m 1
cheng, yb 1
cheung, david w. 1
cheung, ls 1
cheung, mh 1
cheung, vls 1
cheung, yt 1
chim, tw 1
chin, fy 1
ching, whm 1
choi, ako 1
choi, sw 1
chu, x 1
chu, xw 1
chung, k 1
cook, k 1
cui, y 1
dong, d 1
fan, w 1
fan, x 1
fang, l 1
fang, x 1
feng, b 1
fisher, mf 1
fu, y 1
gao, cz 1
gong, t 1
gu, w 1
guo, x 1
guo, y 1
gutmann, b 1
han, c 1
han, changlei 1
he, g 1
he, guangzhu 1
he, l 1
he, m 1
he, zq 1
ho, ws 1
hobbs, n 1
hon, w 1
hou, r 1
hu, c 1
hu, w 1
hu, xh 1
hu, y 1
huang, h 1
huang, j 1
huang, w 1
huang, weihua 1
huang, x 1
huang, y 1
huang, z 1
hui, akt 1
hui, lucas ck 1
ieong, s 1
ip, sk 1
jian, m 1
jiang, y 1
ju, w 1
kanagasabai, r 1
kao, bcm 1
kao, cm 1
kosiol, c 1
kwan, m 1
kwan, yk 1
kwok, ck 1
kwok, lk 1
lai, l 1
lai, p 1
lam, ck 1
lam, hm 1
lam, tty 1
lau, kw 1
lau, skp 1
lau, tck 1
lau, wc 1
lau, yl 1
law, f 1
law, wc 1
law, yw 1
lee, hh 1
lee, j 1
lee, jkw 1
lee, sd 1
leung, fcc 1
leung, hc 1
leung, k 1
leung, karl rph 1
li, b 1
li, ccd 1
li, dinghua 1
li, ehm 1
li, eky 1
li, g 1
li, h 1
li, hy 1
li, jx 1
li, l 1
li, m 1
li, n 1
li, s 1
li, t 1
li, wl 1
li, xq 1
li, zh 1
li, zhenyu 1
liang, h 1
liang, y 1
liao, x 1
liao, xiangke 1
lin, h 1
lin, m 1
lin, mcm 1
lin, r 1
lin, s 1
liu, chi man 1
liu, g 1
liu, guangming 1
liu, h 1
liu, jk 1
liu, q 1
liu, s 1
liu, w 1
liu, y 1
liu, yong 1
liu, yunjie 1
lo, e 1
lu, y 1
lu, yao 1
lu, z 1
lu, zj 1
lum, ct 1
luo, b 1
luo, rb 1
luo, y 1
lv, mj 1
ma, ccc 1
ma, l 1
mai, yh 1
man, ly 1
meng, xx 1
min, j 1
mu, b 1
mui, tw 1
mui, yc 1
mui, z 1
ng, p 1
ng, sm 1
ni, p 1
nie, w 1
nielsen, r 1
niu, xm 1
olson, m 1
pan, q 1
pan, qi 1
parkinson, j 1
peng, shaoliang 1
peng, z 1
peng, zy 1
qian, w 1
qin, h 1
qin, jj 1
qin, n 1
qu, n 1
rajaraman, k 1
ren, k 1
ren, x 1
ren, y 1
ruan, j 1
ryder, oa 1
sasaki, r 1
shan, g 1
shen, f 1
sheng, mm 1
shi, j 1
shi, yujian 1
shi, z 1
siu, wy 1
small, i 1
smith, d 1
son, nt 1
song, b 1
song, xh 1
song, y 1
steiner, cc 1
sun, rwy 1
sun, x 1
susilo, w 1
tang, cy 1
tang, j 1
tang, jingbo 1
tang, ricky wm 1
tian, f 1
tian, g 1
tian, j 1
ting, hing fung 1
tsang, kl 1
tsang, yf 1
tse, hks 1
tse, wl 1
tso, cw 1
tu, w 1
vinar, t 1
vu, h 1
wan, kl 1
wang, ayx 1
wang, bo 1
wang, bq 1
wang, g 1
wang, h 1
wang, jian 1
wang, jun 1
wang, jy 1
wang, k 1
wang, s 1
wang, w 1
wang, wp 1
wang, yd 1
wei, f 1
wen, m 1
wong, fl 1
wong, gks 1
wong, s 1
wong, sck 1
wong, wh 1
woo, pcy 1
wu, emk 1
wu, g 1
wu, gengxiong 1
wu, j 1
wu, q 1
wu, qy 1
wu, x 1
wu, z 1
xiaoqian, zhu 1
xie, x 1
xie, yinlong 1
xie, z 1
xu, a 1
xu, f 1
xu, j 1
xu, l 1
xu, rs 1
xuan, z 1
xue, cj 1
yang, g 1
yang, huanming 1
yang, j 1
yang, z 1
yau, ckj 1
yau, kk 1
ye, c 1
ye, ym 1
yeung, dy 1
yim, a 1
yim, tch 1
yip, ky 1
yip, mcl 1
yiu, sw 1
yu, chang 1
yu, d 1
yu, j 1
yuan, jianying 1
zeng, t 1
zhang, d 1
zhang, g 1
zhang, hao 1
zhang, w 1
zhang, wq 1
zhang, x 1
zhang, yn 1
zhang, z 1
zhao, j 1
zhao, k 1
zhao, ky 1
zhao, m 1
zhao, s 1
zheng, h 1
zheng, y 1
zhong, j 1
zhong, x 1
zhou, y 1
zhu, h 1
zhu, j 1
zhu, w 1
zhu, xg 1
zoe, j 1
View More
Keywords in Publications
keywordsNo. of Authors
algorithms 13
animals 8
genome 8
humans 8
sequence analysis, dna 8
sequence analysis, protein - methods 8
distributed denial-of-service (ddos) 7
intrusion detection 7
privacy 7
routers 7
sequence analysis, dna - methods 7
testbed 7
base sequence 6
blind signature 6
bloom filter 6
computational biology - methods 6
models, chemical 6
molecular sequence data 6
security 6
sequence alignment 6
software 6
alternative splicing 5
anonymous credential 5
authentication 5
binding energy 5
cluster analysis 5
combinatorial group testing 5
commutative encryption 5
computer simulation 5
conserved sequence - genetics 5
dna microarray 5
evolution, molecular 5
homomorphic encryption 5
mice 5
motif finding 5
phylogeny 5
protein interaction mapping - methods 5
proteins - chemistry - metabolism 5
secure vehicular sensor network 5
transcription factor 5
vehicular ad hoc network 5
amino acid motifs 4
anonymous routing 4
artificial intelligence 4
assembly 4
authenticatiion 4
batch verification 4
batch vertification 4
binding sites 4
china 4
chromosome mapping - methods 4
complex structure 4
computational tools 4
computer forensics 4
computer networks 4
contig 4
contig mapping 4
data mining 4
database 4
database operation 4
databases, genetic 4
decision tree 4
diet - veterinary 4
digital arithmetic 4
digital forensic engineering 4
dna - chemistry 4
dogs 4
electric vehicle 4
electronic crime countermeasures 4
error correction 4
event data recorder 4
fake route 4
female 4
fertility - genetics - physiology 4
forward security 4
gap-filling 4
genetic disease 4
genome - genetics 4
genome, human 4
genomics 4
group communication 4
group communications 4
hard disk integrity 4
heterozygote 4
hmac 4
human chromosomes 4
human genomes 4
low coverage 4
manets 4
message classification 4
metrics 4
models, statistical 4
multigene family - genetics 4
multiparty matching 4
multipath 4
oblivious transfer (ot) 4
online catalog 4
polymorphism, single nucleotide - genetics 4
privacy preservation 4
privacy preserving 4
privacy-preserving 4
protein binding 4
proteins - chemistry 4
proxy re-encryption 4
pseudo identity 4
pseudoidentity 4
public-key infrastructure 4
querying service 4
reads alignments 4
receptors, g-protein-coupled - genetics 4
scaffold 4
segmental duplications 4
sensor networks 4
smart grid network 4
snp calling 4
structural variations 4
symmetric cryptography 4
synteny - genetics 4
systematic approaches 4
tamper-resistant device 4
technical speaking 4
transcription factors - chemistry 4
tree optimization 4
ursidae - classification - genetics - physiology 4
vehicular sensor network 4
verification 4
3-dimension hashing 3
5' untranslated regions - genetics 3
access policies 3
actuation 3
adaptive phentype testing 3
alternative splicing - genetics 3
alternative splicing pattern 3
amino acid sequence 3
anonymous fuzzy ibe 3
applied cryptography 3
article 3
attractive solutions 3
bilinear pairings 3
binning 3
biological evolution 3
bittorrent model 3
building block 3
bwt 3
carrier proteins - genetics 3
certificate revocation 3
chinese shanzhai phones 3
cloud forensics 3
cloudfront 3
cluster-based architecture 3
clustering 3
combinatorial group testing (cgt) 3
comparative genomics 3
computational predction 3
computer program 3
computer-aided design 3
computing technology 3
confidential forensic investigation 3
conserved gene pairs 3
conserved genes 3
conserved sequence 3
conseved metabolic pathways 3
context-aware 3
cryptographic primitives 3
cryptographic techniques 3
cryptography 3
cyber-physical system 3
data mining - methods 3
data-base servers 3
database records 3
datamining 3
de bruijn graph 3
de novo assembly 3
de novo transcriptome assembly 3
delegation 3
deleted data 3
digital crimes 3
digital evidence 3
digital forensics 3
distributed ca services 3
dna composition features 3
dna mutational analysis - methods 3
dna sequence 3
dna, complementary - genetics 3
document indexing 3
e-lottery 3
efficient protocols 3
elliptic curve cryptosystems 3
environmental genomics 3
environmental microbiology 3
escherichia coli - classification - genetics - isolation and purification 3
escherichia coli - genetics 3
ests 3
exons 3
exons - genetics 3
experimental studies 3
experimentation 3
expressed sequence tags 3
expressed sequences 3
false positive reactions 3
file carving 3
file sharing 3
firewalls 3
flooding 3
forensic analysis 3
forensic investigation 3
forensics technology 3
forward-secure signature 3
gene expression - genetics 3
gene expression regulation 3
genome, bacterial 3
genome, bacterial - genetics 3
hard disk sector allocation 3
heterogeneous information 3
hierarchical identity-based signature 3
high throughput sequencing 3
high throughput short reads 3
human genome 3
hybrid security model 3
identity-based partially blind signature 3
identity-based signcryption 3
indexing data structure 3
initial seeders 3
inner-product encryption 3
integrity verification 3
internet forum 3
internet piracy 3
internet surveillance 3
introns - genetics 3
isoforms 3
k-dimensional hashing 3
k-mean clustering 3
key integrity 3
keyword clustering 3
knock-out study 3
knockout study 3
l-mer 3
lactobacillus - genetics 3
latent sector errors (lses) 3
legal professional privilege (lpp) 3
lightweight protocols 3
live forensics 3
machine-learning 3
markov chains 3
mate-pair 3
mathematics 3
measurement 3
mediatek 3
memory analysis 3
metabolic network 3
metagenomics 3
metagenomics - methods 3
mice, inbred c57bl 3
micrornas 3
micrornas - chemistry - genetics 3
mining methods and algorithms 3
mobile ad hoc network 3
mobile ad hoc network (manet) 3
models, biological 3
models, genetic 3
models, molecular 3
models, theoretical 3
modified chebychev distance 3
multiple alignment 3
multiprotein complexes - chemistry - metabolism 3
multisignature 3
mutation 3
mutations 3
network security 3
next-generation sequencing 3
non-adaptive complex group testing 3
np-complete 3
oblivious transfer 3
pattern recognition, automated - methods 3
peer data management systems 3
peer to peer 3
performance 3
performance evaluation 3
phonebook 3
photo forensics 3
phylogenetic conservation 3
phylogenetic tree reconstruction 3
pki 3
pooling design 3
predicate encryption 3
predictive value of tests 3
privacy preserving forensics 3
privacy-preserving multiple keyword search 3
proactive update 3
promoter regions, genetic 3
protein interaction mapping 3
protein linkage 3
protein structure, tertiary 3
proteins 3
provable security 3
public ciphertext authenticity 3
public key cryptosystems 3
public verifiability 3
quantitative trait loci - genetics 3
query processing 3
rats 3
reliability 3
remote forensics 3
rna - genetics 3
rna splice sites - genetics 3
rna-binding proteins - genetics 3
search on encrypted data 3
secure multi-party computation 3
self-defense 3
semantical security 3
semistructured data 3
sequence alignment - methods 3
sequence analysis, rna 3
shanzhai mobile phone 3
shifted transversal design 3
short read alignment 3
similarity measure 3
string graph 3
structural comparisons 3
synteny 3
tamper proofing 3
the standard model 3
threshold cryptography 3
threshold partially blind signature 3
threshold secret sharing 3
tracking 3
user profiling 3
verifiable random function 3
virus detection 3
volatile data 3
web crawler 3
web organization 3
weighted average problem 3
whole genome alignment 3
xml 3
xml/xsl/rdf 3
zebrafish - genetics 3
access control 2
access right delegation 2
access rights 2
accountability 2
ad-hoc network 2
adaptive random testing 2
affine gap 2
android 2
android security 2
anonymity 2
anonymous authentication 2
anti-censorship 2
application platforms 2
applications software 2
attributes 2
audio 2
auxiliary inputs 2
base pairing 2
basic operation 2
bioinformatics 2
birthmark 2
capability leaks 2
cell cycle pathway construction 2
center of gravity constraint 2
chained threshold proxy signature with supervision 2
cloud computing 2
code theft detection 2
collision detection 2
compression 2
computation efficiency 2
computational geometry 2
computer graphics 2
computer science 2
computer security 2
construcion 2
content providers 2
content sharing 2
control flow 2
control flow checking 2
copyright 2
data compression - methods 2
data flow checking 2
data leakage 2
data privacy 2
data protection 2
databases, protein 2
delegation certificate 2
delegation network 2
dense regions 2
density measure 2
digital contents 2
digital credential 2
digital identity management 2
digital investigation 2
digital rights management technology 2
directed diffusion 2
disordered proteins 2
distance learning 2
dna - genetics 2
document management systems 2
duplication detection 2
dynamic programming 2
dynamic separation of duty 2
efficiency 2
efficiency improvement 2
elements 2
elliptic curve 2
encrypted documents 2
evidence integrity 2
evolutionary rate 2
execution time 2
forward secrecy 2
forward secure threshold signature 2
gene regulation 2
general access structure 2
generic construction 2
genetic variation 2
genome, human - genetics 2
genomic sequence 2
hard disks 2
hash value 2
hash values 2
identity based cryptography 2
identity-based cryptography 2
identity-based signature 2
information security 2
information systems security 2
instant message 2
integrity check 2
internet 2
internet censorship 2
interoperability 2
intracellular signaling peptides and proteins - chemistry - genetics - metabolism 2
java 2
java applet 2
javascript 2
k-dimension hashing 2
key agreement 2
learning organizations 2
level-2 neighbours 2
lineage specificity 2
linux kernel 2
local structural alignment 2
mapk pathway 2
mapk pathway construction 2
memory efficient algorithm 2
memory requirements 2
mobile phone 2
mobile platform 2
multiplicative sharing 2
named data networking 2
nni distance 2
non-coding rna 2
non-repudiation 2
non-shared edge distance 2
noncoding rnas 2
nonlinear state estimation 2
novel tandem duplication detection 2
nucleic acid conformation 2
nucleotides - chemistry - genetics 2
online computing 2
open sources 2
pathway construction 2
pattern mathching 2
phylogenetic tree 2
privilege escalation attack 2
protein pathway 2
protein pathway construction 2
proxy server 2
proxy signature 2
pseudoknot 2
pseudoknots 2
public key infrastructure (pki) 2
quantitative association rules 2
quantum cryptography 2
quantum key distribution 2
r-sequences 2
random testing 2
randomised algorithm 2
real data sets 2
real spontaneity 2
reputation systems 2
ring signature 2
rna - chemistry - genetics 2
rna, untranslated - chemistry - classification 2
rna, untranslated - chemistry - genetics 2
rna, untranslated - genetics 2
rna-seq 2
role activation 2
role based access control 2
runtimes 2
secondary structure 2
secure browsing 2
security management 2
security of data 2
selective dissemination of information 2
sequence analysis, rna - methods 2
sequence assembly 2
sequences 2
service provider 2
shared documents 2
short reads 2
side channel attack 2
signal transduction 2
signal transduction pathway 2
signing key 2
smart grids 2
smart router 2
smartcard 2
smartphone 2
software birthmark 2
software protection 2
splice junction 2
spliced alignment 2
spontaneity 2
spontaneous anonymous group signature 2
static taint analysis 2
structural alignment 2
system biology 2
systems assurance 2
taint analysis 2
taint checking 2
text indexing 2
third parties 2
threshold proxy signature 2
threshold ring signature 2
tissue specificity 2
unlinkability 2
virtual reality 2
voice chat 2
wireless sensor networks 2
xpath 2
biomarker discovery 1
compact private key 1
complex pseudoknot 1
consecutive vertex guard 1
data confidentiality 1
drug-drug interaction 1
dynamic threshold public key encryption 1
edge guard 1
encrypted gene expression profiles 1
event-oriented 1
exclusion-intersection encryption 1
fortress problem 1
gall 1
group signature 1
ibe 1
identity-based encryption 1
k-taa 1
key-exposure 1
leakage-resilience 1
leakage-resilient 1
matrix factorization 1
multiple encryption keys 1
online/offline encryption 1
pairing 1
pairings 1
pattern recognition, automated 1
prediction 1
privacy-preserving elastic net 1
public key encryption 1
randomness 1
regression 1
regulatory elements, transcriptional 1
related-key attack 1
related-randomness attack 1
release-time confidentiality 1
revocable anonymity 1
rna 1
rna -- structure. 1
rna, untranslated - chemistry 1
rna. 1
secondary structure prediction 1
side effects 1
signatures 1
simple non-standard pseudoknot 1
threshold ring signatures 1
timed-release encryption 1
transcription factors - chemistry - metabolism 1
transcription factors/genetics 1
View More