Co-Authors
AuthorsNo. of Publications
hui, lck 90
lam, tw 61
chow, kp 43
chin, fyl 38
leung, hcm 35
li, vok 28
hui, ck 27
sung, wk 26
chim, tw 24
chow, ssm 21
wong, tkf 20
jiang, zl 17
cheung, dwl 16
fang, j 14
ting, hf 14
li, r 12
hon, wk 11
peng, y 11
wang, y 11
chong, cf 10
dong, y 10
tsang, ww 10
yuen, th 10
cheung, dw 9
mamoulis, n 9
wang, j 9
chan, hw 8
li, y 8
liu, x 8
pun, kh 8
zhang, y 8
lai, pky 7
liu, b 7
lui, rwc 7
wong, pwh 7
ye, y 7
yu, c 7
chan, hl 6
he, y 6
leung, ws 6
lin, mc 6
liu, cm 6
luo, r 6
sadakane, k 6
sui, af 6
wong, t 6
xiong, h 6
chan, pf 5
chan, py 5
cui, x 5
fang, jb 5
go, hw 5
kung, hf 5
li, z 5
lian, w 5
smith, dk 5
tang, y 5
wang, ek 5
wang, x 5
yang, b 5
zhang, c 5
zhang, j 5
chan, ppf 4
cheung, bwy 4
hui, l 4
jia, y 4
jiang, l 4
lim, bl 4
niu, x 4
siu, mh 4
tam, sl 4
wang, l 4
wong, kf 4
wong, wk 4
yu, ky 4
zhu, x 4
chen, j 3
chen, y 3
cheung, b 3
cheung, bsn 3
han, q 3
he, yj 3
hou, sh 3
huang, h 3
huang, s 3
jiang, z 3
kwan, myk 3
law, fyw 3
leung, sy 3
li, j 3
liu, z 3
shen, z 3
shi, jy 3
shi, y 3
sung, kwk 3
tsang, yh 3
uehara, t 3
wang, b 3
wong, ck 3
woo, y 3
yang, d 3
yang, w 3
yau, jck 3
zhan, q 3
zhang, h 3
zhang, p 3
au, mh 2
chan, tf 2
chen, l 2
chen, z 2
cheng, s 2
cheung, jcl 2
chiu, ys 2
chow, sm 2
he, mf 2
he, z 2
ho, ws 2
hou, s 2
hsu, by 2
huang, q 2
ieong, r 2
ieong, rsc 2
jansson, j 2
kao, my 2
kristiansen, k 2
lai, ym 2
lam, tak wah 2
lee, lk 2
leung, cm 2
li, d 2
li, jx 2
li, p 2
li, q 2
li, rq 2
li, yingrui 2
liang, c 2
liu, binghang 2
lu, n 2
lui, wc 2
luo, ruibang 2
niu, xm 2
peng, s 2
qin, j 2
qing, s 2
quan, g 2
rosenfeld, r 2
song, y 2
song, yq 2
sun, y 2
tam, a 2
tan, z 2
tang, b 2
wang, m 2
wang, yd 2
wijaya, e 2
wong, ds 2
wong, shy 2
wu, e 2
wu, e 2
xiang, cl 2
xiang, q 2
xie, y 2
xu, x 2
yang, h 2
ye, ym 2
yeung, cy 2
yuan, j 2
zhang, ep 2
zhang, q 2
zhang, yn 2
zheng, x 2
zhou, b 2
zhou, g 2
an, n 1
bai, f 1
bai, y 1
bolund, l 1
bond, cs 1
bruford, mw 1
cai, j 1
cai, q 1
cai, yp 1
cao, j 1
cao, jb 1
castleden, i 1
cbow, ssm 1
chan, cf 1
chan, dtf 1
chan, eyk 1
chan, ft 1
chan, km 1
chan, kp 1
chan, p 1
chan, pck 1
chan, ps 1
chang, ky 1
chanson, st 1
che, cm 1
chen, jc 1
chen, k 1
chen, ty 1
chen, yanxiang 1
cheng, ky 1
cheng, m 1
cheng, yb 1
cheung, david w. 1
cheung, ls 1
cheung, mh 1
cheung, vls 1
cheung, yt 1
chim, tw 1
chin, fy 1
ching, whm 1
choi, ako 1
choi, sw 1
chu, x 1
chu, xw 1
chung, k 1
cook, k 1
cui, y 1
dong, d 1
dong, k 1
fan, w 1
fan, x 1
fang, l 1
fang, x 1
feng, b 1
fisher, mf 1
fu, y 1
gao, cz 1
gao, k 1
gong, t 1
gu, w 1
guo, x 1
guo, y 1
gutmann, b 1
han, c 1
han, changlei 1
he, g 1
he, guangzhu 1
he, l 1
he, m 1
he, zq 1
ho, ws 1
hobbs, n 1
hon, w 1
hou, r 1
hu, c 1
hu, w 1
hu, xh 1
hu, y 1
huang, j 1
huang, w 1
huang, weihua 1
huang, x 1
huang, y 1
huang, z 1
hui, akt 1
hui, lucas ck 1
ieong, s 1
ip, sk 1
jian, m 1
jiang, y 1
ju, w 1
kanagasabai, r 1
kao, bcm 1
kao, cm 1
kosiol, c 1
kwan, m 1
kwan, yk 1
kwok, ck 1
kwok, lk 1
lai, l 1
lai, p 1
lam, ck 1
lam, hm 1
lam, tty 1
lau, kw 1
lau, skp 1
lau, tck 1
lau, wc 1
lau, yl 1
law, f 1
law, wc 1
law, yw 1
lee, hh 1
lee, j 1
lee, jkw 1
lee, sd 1
lei, p 1
leung, fcc 1
leung, hc 1
leung, k 1
leung, karl rph 1
li, b 1
li, ccd 1
li, dinghua 1
li, ehm 1
li, eky 1
li, g 1
li, h 1
li, hy 1
li, l 1
li, m 1
li, n 1
li, s 1
li, t 1
li, wl 1
li, xq 1
li, yp 1
li, zh 1
li, zhenyu 1
liang, h 1
liang, y 1
liao, x 1
liao, xiangke 1
lin, h 1
lin, m 1
lin, mcm 1
lin, r 1
lin, s 1
liu, chi man 1
liu, g 1
liu, guangming 1
liu, h 1
liu, jk 1
liu, q 1
liu, s 1
liu, w 1
liu, y 1
liu, yong 1
liu, yunjie 1
liu, zc 1
lo, e 1
lu, y 1
lu, yao 1
lu, z 1
lu, zj 1
lum, ct 1
luo, b 1
luo, rb 1
luo, y 1
lv, mj 1
ma, ccc 1
ma, l 1
mai, yh 1
man, ly 1
mao, kt 1
meng, xx 1
min, j 1
mu, b 1
mui, tw 1
mui, yc 1
mui, z 1
ng, p 1
ng, sm 1
ni, p 1
nie, w 1
nielsen, r 1
olson, m 1
pan, q 1
pan, qi 1
parkinson, j 1
peng, shaoliang 1
peng, z 1
peng, zy 1
qian, w 1
qin, h 1
qin, jj 1
qin, n 1
qu, n 1
rajaraman, k 1
ren, k 1
ren, x 1
ren, y 1
ruan, j 1
ryder, oa 1
sasaki, r 1
shan, g 1
shen, f 1
sheng, mm 1
shi, j 1
shi, yujian 1
shi, z 1
siu, wy 1
small, i 1
smith, d 1
son, nt 1
song, b 1
song, xh 1
song, y 1
steiner, cc 1
sun, rwy 1
sun, x 1
susilo, w 1
tang, cy 1
tang, j 1
tang, jingbo 1
tang, ricky wm 1
tian, f 1
tian, g 1
tian, j 1
ting, hing fung 1
tsang, kl 1
tsang, yf 1
tse, hks 1
tse, wl 1
tso, cw 1
tu, w 1
vinar, t 1
vu, h 1
wan, kl 1
wang, ayx 1
wang, bo 1
wang, bq 1
wang, g 1
wang, h 1
wang, jian 1
wang, jun 1
wang, jy 1
wang, k 1
wang, s 1
wang, w 1
wang, wp 1
wang, xm 1
wei, f 1
wen, m 1
wong, fl 1
wong, gks 1
wong, s 1
wong, sck 1
wong, wh 1
woo, pcy 1
wu, emk 1
wu, g 1
wu, gengxiong 1
wu, j 1
wu, q 1
wu, qy 1
wu, x 1
wu, xy 1
wu, z 1
xiaoqian, zhu 1
xie, x 1
xie, yinlong 1
xie, z 1
xu, a 1
xu, f 1
xu, j 1
xu, l 1
xu, rs 1
xuan, z 1
xue, cj 1
yang, g 1
yang, huanming 1
yang, j 1
yang, z 1
yao, h 1
yau, ckj 1
yau, kk 1
ye, c 1
yeung, dy 1
yim, a 1
yim, tch 1
yip, ky 1
yip, mcl 1
yiu, sw 1
yu, chang 1
yu, d 1
yu, h 1
yu, j 1
yuan, jianying 1
zeng, t 1
zhang, d 1
zhang, g 1
zhang, hao 1
zhang, hl 1
zhang, w 1
zhang, wq 1
zhang, x 1
zhang, z 1
zhao, j 1
zhao, k 1
zhao, ky 1
zhao, m 1
zhao, s 1
zheng, h 1
zheng, y 1
zhong, j 1
zhong, x 1
zhou, y 1
zhu, h 1
zhu, j 1
zhu, w 1
zhu, xg 1
zoe, j 1
View More
Keywords in Publications
keywordsNo. of Authors
algorithms 13
animals 8
genome 8
humans 8
privacy 8
sequence analysis, dna 8
sequence analysis, protein - methods 8
distributed denial-of-service (ddos) 7
intrusion detection 7
routers 7
sequence analysis, dna - methods 7
testbed 7
base sequence 6
blind signature 6
bloom filter 6
computational biology - methods 6
models, chemical 6
molecular sequence data 6
security 6
sequence alignment 6
software 6
alternative splicing 5
anonymous credential 5
artificial intelligence 5
authentication 5
bilinear pairings 5
binding energy 5
cluster analysis 5
combinatorial group testing 5
commutative encryption 5
computer simulation 5
conserved sequence - genetics 5
dna microarray 5
evolution, molecular 5
homomorphic encryption 5
mice 5
motif finding 5
phylogeny 5
protein interaction mapping - methods 5
proteins - chemistry - metabolism 5
secure vehicular sensor network 5
transcription factor 5
vehicular ad hoc network 5
amino acid motifs 4
anonymous routing 4
assembly 4
authenticatiion 4
batch verification 4
batch vertification 4
binding sites 4
china 4
chromosome mapping - methods 4
complex structure 4
computational tools 4
computer forensics 4
computer networks 4
contig 4
contig mapping 4
data mining 4
database 4
database operation 4
databases, genetic 4
decision tree 4
diet - veterinary 4
digital arithmetic 4
digital forensic engineering 4
dna - chemistry 4
dogs 4
electric vehicle 4
electronic crime countermeasures 4
error correction 4
event data recorder 4
fake route 4
female 4
fertility - genetics - physiology 4
forward security 4
gap-filling 4
genetic disease 4
genome - genetics 4
genome, human 4
genomics 4
group communication 4
group communications 4
hard disk integrity 4
heterozygote 4
hmac 4
human chromosomes 4
human genomes 4
low coverage 4
manets 4
message classification 4
metrics 4
models, statistical 4
multigene family - genetics 4
multiparty matching 4
multipath 4
oblivious transfer (ot) 4
online catalog 4
polymorphism, single nucleotide - genetics 4
privacy preservation 4
privacy preserving 4
privacy-preserving 4
protein binding 4
proteins - chemistry 4
proxy re-encryption 4
pseudo identity 4
pseudoidentity 4
public-key infrastructure 4
querying service 4
reads alignments 4
receptors, g-protein-coupled - genetics 4
scaffold 4
segmental duplications 4
sensor networks 4
smart grid network 4
snp calling 4
structural variations 4
symmetric cryptography 4
synteny - genetics 4
systematic approaches 4
tamper-resistant device 4
technical speaking 4
transcription factors - chemistry 4
tree optimization 4
ursidae - classification - genetics - physiology 4
vehicular sensor network 4
verification 4
3-dimension hashing 3
5' untranslated regions - genetics 3
access policies 3
actuation 3
adaptive phentype testing 3
alternative splicing - genetics 3
alternative splicing pattern 3
amino acid sequence 3
anonymous authentication 3
anonymous fuzzy ibe 3
applied cryptography 3
article 3
attractive solutions 3
auxiliary inputs 3
binning 3
biological evolution 3
bittorrent model 3
building block 3
bwt 3
carrier proteins - genetics 3
certificate revocation 3
chinese shanzhai phones 3
cloud forensics 3
cloudfront 3
cluster-based architecture 3
clustering 3
combinatorial group testing (cgt) 3
comparative genomics 3
computation efficiency 3
computational predction 3
computer program 3
computer-aided design 3
computing technology 3
confidential forensic investigation 3
conserved gene pairs 3
conserved genes 3
conserved sequence 3
conseved metabolic pathways 3
context-aware 3
cryptographic primitives 3
cryptographic techniques 3
cryptography 3
cyber-physical system 3
data mining - methods 3
data-base servers 3
database records 3
datamining 3
de bruijn graph 3
de novo assembly 3
de novo transcriptome assembly 3
delegation 3
deleted data 3
digital crimes 3
digital evidence 3
digital forensics 3
distributed ca services 3
dna composition features 3
dna mutational analysis - methods 3
dna sequence 3
dna, complementary - genetics 3
document indexing 3
e-lottery 3
efficiency improvement 3
efficient protocols 3
elliptic curve cryptosystems 3
environmental genomics 3
environmental microbiology 3
escherichia coli - classification - genetics - isolation and purification 3
escherichia coli - genetics 3
ests 3
exons 3
exons - genetics 3
experimental studies 3
experimentation 3
expressed sequence tags 3
expressed sequences 3
false positive reactions 3
file carving 3
file sharing 3
firewalls 3
flooding 3
forensic analysis 3
forensic investigation 3
forensics technology 3
forward-secure signature 3
gene expression - genetics 3
gene expression regulation 3
generic construction 3
genome, bacterial 3
genome, bacterial - genetics 3
hard disk sector allocation 3
heterogeneous information 3
hierarchical identity-based cryptosystem 3
hierarchical identity-based signature 3
high throughput sequencing 3
high throughput short reads 3
human genome 3
hybrid security model 3
identity-based partially blind signature 3
identity-based signcryption 3
indexing data structure 3
initial seeders 3
inner-product encryption 3
integrity verification 3
internet forum 3
internet piracy 3
internet surveillance 3
introns - genetics 3
isoforms 3
k-dimensional hashing 3
k-mean clustering 3
key integrity 3
keyword clustering 3
knock-out study 3
knockout study 3
l-mer 3
lactobacillus - genetics 3
latent sector errors (lses) 3
legal professional privilege (lpp) 3
lightweight protocols 3
live forensics 3
machine-learning 3
markov chains 3
mate-pair 3
mathematics 3
measurement 3
mediatek 3
memory analysis 3
metabolic network 3
metagenomics 3
metagenomics - methods 3
mice, inbred c57bl 3
micrornas 3
micrornas - chemistry - genetics 3
mining methods and algorithms 3
mobile ad hoc network 3
mobile ad hoc network (manet) 3
models, biological 3
models, genetic 3
models, molecular 3
models, theoretical 3
modified chebychev distance 3
multiple alignment 3
multiprotein complexes - chemistry - metabolism 3
multisignature 3
mutation 3
mutations 3
network security 3
next-generation sequencing 3
non-adaptive complex group testing 3
np-complete 3
oblivious transfer 3
pattern recognition, automated - methods 3
peer data management systems 3
peer to peer 3
performance 3
performance evaluation 3
phonebook 3
photo forensics 3
phylogenetic conservation 3
phylogenetic tree reconstruction 3
pki 3
pooling design 3
predicate encryption 3
predictive value of tests 3
privacy preserving forensics 3
privacy-preserving multiple keyword search 3
proactive update 3
promoter regions, genetic 3
protein interaction mapping 3
protein linkage 3
protein structure, tertiary 3
proteins 3
provable security 3
public ciphertext authenticity 3
public key cryptosystems 3
public verifiability 3
quantitative trait loci - genetics 3
query processing 3
rats 3
reliability 3
remote forensics 3
reputation systems 3
rna - genetics 3
rna splice sites - genetics 3
rna-binding proteins - genetics 3
search on encrypted data 3
secure multi-party computation 3
security of data 3
self-defense 3
semantical security 3
semistructured data 3
sequence alignment - methods 3
sequence analysis, rna 3
service provider 3
shanzhai mobile phone 3
shifted transversal design 3
short read alignment 3
side channel attack 3
signcryption 3
signing key 3
similarity measure 3
string graph 3
structural comparisons 3
synteny 3
tamper proofing 3
the standard model 3
third parties 3
threshold cryptography 3
threshold partially blind signature 3
threshold secret sharing 3
tracking 3
user profiling 3
verifiable random function 3
virus detection 3
volatile data 3
web crawler 3
web organization 3
weighted average problem 3
whole genome alignment 3
xml 3
xml/xsl/rdf 3
zebrafish - genetics 3
access control 2
access right delegation 2
access rights 2
accountability 2
ad-hoc network 2
adaptive random testing 2
affine gap 2
android 2
android security 2
anonymity 2
anti-censorship 2
application platforms 2
applications software 2
attributes 2
audio 2
base pairing 2
basic operation 2
bioinformatics 2
birthmark 2
capability leaks 2
cell cycle pathway construction 2
center of gravity constraint 2
chained threshold proxy signature with supervision 2
cloud computing 2
code theft detection 2
collision detection 2
compression 2
computational geometry 2
computer graphics 2
computer science 2
computer security 2
construcion 2
content providers 2
content sharing 2
control flow 2
control flow checking 2
copyright 2
data compression - methods 2
data flow checking 2
data leakage 2
data privacy 2
data protection 2
databases, protein 2
delegation certificate 2
delegation network 2
dense regions 2
density measure 2
digital contents 2
digital credential 2
digital identity management 2
digital investigation 2
digital rights management technology 2
directed diffusion 2
disordered proteins 2
distance learning 2
dna - genetics 2
document management systems 2
duplication detection 2
dynamic programming 2
dynamic separation of duty 2
dynamic threshold public key encryption 2
efficiency 2
elements 2
elliptic curve 2
encrypted documents 2
evidence integrity 2
evolutionary rate 2
execution time 2
forward secrecy 2
forward secure threshold signature 2
gene regulation 2
general access structure 2
genetic variation 2
genome, human - genetics 2
genomic sequence 2
hard disks 2
hash value 2
hash values 2
ibe 2
identity based cryptography 2
identity-based cryptography 2
identity-based encryption 2
identity-based signature 2
information security 2
information systems security 2
instant message 2
integrity check 2
internet 2
internet censorship 2
interoperability 2
intracellular signaling peptides and proteins - chemistry - genetics - metabolism 2
java 2
java applet 2
javascript 2
k-dimension hashing 2
key agreement 2
key-exposure 2
leakage-resilience 2
leakage-resilient 2
learning organizations 2
level-2 neighbours 2
lineage specificity 2
linux kernel 2
local structural alignment 2
mapk pathway 2
mapk pathway construction 2
memory efficient algorithm 2
memory requirements 2
mobile phone 2
mobile platform 2
multiplicative sharing 2
named data networking 2
nni distance 2
non-coding rna 2
non-repudiation 2
non-shared edge distance 2
noncoding rnas 2
nonlinear state estimation 2
novel tandem duplication detection 2
nucleic acid conformation 2
nucleotides - chemistry - genetics 2
online computing 2
open sources 2
pairing 2
pathway construction 2
pattern mathching 2
phylogenetic tree 2
privilege escalation attack 2
protein pathway 2
protein pathway construction 2
proxy server 2
proxy signature 2
pseudoknot 2
pseudoknots 2
public key encryption 2
public key infrastructure (pki) 2
quantitative association rules 2
quantum cryptography 2
quantum key distribution 2
r-sequences 2
random testing 2
randomised algorithm 2
randomness 2
real data sets 2
real spontaneity 2
related-key attack 2
related-randomness attack 2
ring signature 2
rna - chemistry - genetics 2
rna, untranslated - chemistry - classification 2
rna, untranslated - chemistry - genetics 2
rna, untranslated - genetics 2
rna-seq 2
role activation 2
role based access control 2
runtimes 2
secondary structure 2
secure browsing 2
security management 2
selective dissemination of information 2
sequence analysis, rna - methods 2
sequence assembly 2
sequences 2
shared documents 2
short reads 2
signal transduction 2
signal transduction pathway 2
signatures 2
smart grids 2
smart router 2
smartcard 2
smartphone 2
software birthmark 2
software protection 2
splice junction 2
spliced alignment 2
spontaneity 2
spontaneous anonymous group signature 2
static taint analysis 2
structural alignment 2
system biology 2
systems assurance 2
taint analysis 2
taint checking 2
text indexing 2
threshold proxy signature 2
threshold ring signature 2
threshold ring signatures 2
tissue specificity 2
unlinkability 2
virtual reality 2
voice chat 2
wireless sensor networks 2
xpath 2
biomarker discovery 1
compact private key 1
complex pseudoknot 1
consecutive vertex guard 1
data confidentiality 1
drug-drug interaction 1
edge guard 1
encrypted gene expression profiles 1
event-oriented 1
exclusion-intersection encryption 1
fortress problem 1
gall 1
group signature 1
k-taa 1
matrix factorization 1
multiple encryption keys 1
online/offline encryption 1
pairings 1
pattern recognition, automated 1
prediction 1
privacy-preserving elastic net 1
regression 1
regulatory elements, transcriptional 1
release-time confidentiality 1
revocable anonymity 1
rna 1
rna -- structure. 1
rna, untranslated - chemistry 1
rna. 1
secondary structure prediction 1
side effects 1
simple non-standard pseudoknot 1
timed-release encryption 1
transcription factors - chemistry - metabolism 1
transcription factors/genetics 1
View More