Publications
Filters
523 result(s)
On False Data Injection Attacks Against Railway Traction Power Systems
David K. Y. Yau, 2016, http://people.sutd.edu.sg/~david_yau/publications/subhash2016dsn.pdf
On Applying Fault Detectors against False Data Injection Attacks in Cyber-Physical Control Systems
David K. Y. Yau, 2016, http://people.sutd.edu.sg/~david_yau/publications/quyen2016infocom.pdf
Optimal False Data Injection Attack against Automatic Generation Control in Power Grids
David K. Y. Yau, 2016, http://people.sutd.edu.sg/~david_yau/publications/tan2016iccps.pdf
Poster: Taming Asymmetric Delays for Network Time Protocol Using Electric Grid Frequency
David K. Y. Yau, 2016, http://people.sutd.edu.sg/~david_yau/publications/rabadi2016mobisys.pdf
A Hybrid Approach to Matching Taxis and Customers
M. Meghjani, 2016
An Interaction-based Approach to Detecting Highly Interactive Twitter Communities using Tweeting Links
Kwan Hui Lim, 2016
Binary Hashing with Semidefinite Relaxation and Augmented Lagrangian
NM Cheung, 2016, https://www.dropbox.com/s/bga7ac7rq9yss30/sdp_hashing.pdf?dl=0
Chronic Wound Assessment Using Deep Neural Network
NM Cheung, 2016
Computation and Memory Efficient Image Segmentation
NM Cheung, 2016, https://www.dropbox.com/s/77z3rtndhak5soe/yiren_tcsvt_2016.pdf?dl=0
Confidential cooperative communication with trust degree of potential eavesdroppers
J.Ryu, J. Lee, and T. Q. S. Quek, 2016, “Confidential cooperative communication with trust degree of potential eavesdroppers,” IEEE Transactions on Wireless Communications, vol. 15, no. 6, pp. 3823 – 383