Publications

809 result(s)
A Sense of Ice and Fire: Exploring Thermal Feedback with Multiple Thermoelectric-cooling Elements on a Smart Ring
Zhu Kening, Simon Perrault, Taizhou Chen, Shaoyu Cai, Roshan L Peiris, 2019, International Journal of Human-Computer Studies, Volume 130, 234-247, https://doi.org/10.1016/j.ijhcs.2019.07.003
A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation
Partha P. Biswas, Heng Chuan Tan, Qingbo Zhu, Yuan Li, Daisuke Mashima, and Binbin Chen, 2019, IEEE SmartGridComm (SGC)
AD-Link: An Adaptive Approach for User Identity Linkage
Xin MU, Wei XIE, Roy Ka-Wei LEE, Feida ZHU, Ee-Peng LIM, 2019, IEEE International Conference on Big Knowledge (ICBK’19), IEEE International Conference on Big Knowledge (ICBK’19), IEEE International Conference on Big Knowledge (ICBK’19), IEEE International Conference on Big Knowledge (ICBK’19), IEEE International Conference on Big Knowledge (ICBK’19)
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
YXM Tan, A Iacovazzi, I Homoliak, Y Elovici, A Binder, 2019, 2019 International Joint Conference on Neural Networks (IJCNN), 1-10, https://ieeexplore.ieee.org/iel7/8840768/8851681/08852414.pdf
Attacks on Smart Grid: Power Supply Interruption and Malicious Power Generation
Adepu S, Kandasamy N. K, Zhou J. and Mathur A, 2019, “Attacks on Smart Grid: Power Supply Interruption and Malicious Power Generation,” International Journal of Information Security, accepted for publication
Attention Guided Graph Convolutional Networks for Relation Extraction
Zhijiang Guo, Yan Zhang and Wei Lu, 2019, “Attention Guided Graph Convolutional Networks for Relation Extraction”, ACL’19: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics
Binary Constrained Deep Hashing Network for Image Retrieval without Manual Annotation
TT Do, T Hoang, DK Le Tan, T Pham, H Le, NM Cheung, I Reid, 2019, in Proc. IEEE Winter Conference on Applications of Computer Vision (WACV) 2019, https://www.dropbox.com/s/xpc6wvr4tt44z53/Toan_WACV_2019.pdf?dl=0
BriskStream: Scaling Data Stream Processing on Shared-Memory Multicore Architectures
Shuhao Zhang, Jiong He, Amelie Chi Zhou, Bingsheng He, 2019, SIGMOD, SIGMOD, SIGMOD, SIGMOD
Can we add value to EV certificates?
P. Szalachowski, 2019, ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), 2019
Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection Enforced by Trusted Computing
Flavio Toffalini, Martin Ochoa, Jun Sun, and Jianying Zhou, 2019, 2019 ACM Conference on Data and Application Security and Privacy (CODASPY’19)