Seguir
Vrizlynn Thing
Vrizlynn Thing
Afiliación desconocida
Dirección de correo verificada de ieee.org - Página principal
Título
Citado por
Citado por
Año
Securing android: a survey, taxonomy, and challenges
DJJ Tan, TW Chua, VLL Thing
ACM Computing Surveys (CSUR) 47 (4), 58, 2015
207*2015
Autonomous Vehicle Security: A Taxonomy of Attacks and Defences
VLL Thing, J Wu
Internet of Things (iThings) and IEEE Green Computing and Communications …, 2016
2032016
Twenty years of digital audio watermarking—a comprehensive review
G Hua, J Huang, YQ Shi, J Goh, VLL Thing
Signal Processing 128, 222-242, 2016
1992016
Image Region Forgery Detection: A Deep Learning Approach
Y Zhang, LL Win, J Goh, VLL Thing
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber …, 2016
1932016
IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach
VLL Thing
Wireless Communications and Networking Conference (WCNC), 2017 IEEE, 1-6, 2017
1902017
Live memory forensics of mobile phones
VLL Thing, KY Ng, EC Chang
digital investigation 7, S74-S82, 2010
1632010
Port hopping for resilient networks
HCJ Lee, VLL Thing
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3291-3295, 2004
1622004
A survey on image tampering and its detection in real-world photos
L Zheng, Y Zhang, VLL Thing
Journal of Visual Communication and Image Representation 58, 380-399, 2019
1612019
Automated face swapping and its detection
Y Zhang, L Zheng, VLL Thing
Signal and Image Processing (ICSIP), 2017 IEEE 2nd International Conference …, 2017
1392017
ICMP traceback with cumulative path, an efficient solution for IP traceback
HCJ Lee, VLL Thing, Y Xu, M Ma
International Conference on Information and Communications Security, 124-135, 2003
1012003
Biff: A blockchain-based iot forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE Region 10 Conference, 2372-2377, 2018
882018
Fingerprint liveness detection from single image using low-level features and shape analysis
RK Dubey, J Goh, VLL Thing
IEEE Transactions on Information Forensics and Security 11 (7), 1461-1475, 2016
842016
Time-spread echo-based audio watermarking with optimized imperceptibility and robustness
G Hua, J Goh, VLL Thing
IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP) 23 (2 …, 2015
772015
A survey of bots used for distributed denial of service attacks
VL Thing, M Sloman, N Dulay
IFIP International Information Security Conference, 229-240, 2007
772007
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
International Conference on Advanced Data Mining and Applications, 727-740, 2017
762017
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic
I Nevat, DM Divakaran, SG Nagarajan, P Zhang, L Su, LL Ko, VLL Thing
IEEE/ACM Transactions on Networking (TON) 26 (1), 131-144, 2018
692018
Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment
BS Lim, SL Keoh, VLL Thing
612018
A scalable and extensible framework for android malware detection and family attribution
L Zhang, VLL Thing, Y Cheng
Computers & Security 80, 120-133, 2019
602019
A novel support vector machine approach to high entropy data fragment classification
Q Li, A Ong, P Suganthan, V Thing
Proceedings of the South African Information Security Multi-Conf (SAISMC …, 2011
602011
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study
Z Wang, KW Fok, VLL Thing
Computers & Security 113, 102542, 2022
592022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20