Publications

829 result(s)
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems using Physically Unclonable Functions
P. Gope, J. Lee, T. Q. S. Quek, 2018, IEEE Trans. Information Forensics, and Security, vol. 13, no. 11, pp. 2831–2843, Nov. 2018, IEEE Trans. Information Forensics, and Security, vol. 13, no. 11, pp. 2831–2843, Nov. 2018, IEEE Trans. Information Forensics, and Security, vol. 13, no. 11, pp. 2831–2843, Nov. 2018
On the Sequential Massart Algorithm for Statistical Model Checking
Cyrille Jegourel, Jun Sun, Jin Song Dong, 2018, ISoLA 2018, Limassol, Cyprus, 287-304. October 30 -November 13, 2018, ISoLA 2018, Limassol, Cyprus, 287-304. October 30 -November 13, 2018, ISoLA 2018, Limassol, Cyprus, 287-304. October 30 -November 13, 2018, Limassol, Cyprus
Automated directed fairness testing
Sakshi Udeshi, Pryanshu Arora, Sudipta Chattopadhyay, 2018, Proceedings of the 33rd (ACM/IEEE) International Conference on Automated Software Engineering, (ASE) 2018, Proceedings of the 33rd (ACM/IEEE) International Conference on Automated Software Engineering, (ASE) 2018, Proceedings of the 33rd (ACM/IEEE) International Conference on Automated Software Engineering, (ASE) 2018, Montpellier, France
Mining Influentials and their Bot Activities on Twitter Campaigns
Shanika Karunasekera, Kwan Hui Lim, Aaron Harwood, 2018, Proceedings of the 7th International Workshop on New Frontiers in Mining Complex Patterns (NFMCP’18), in-conjunction with ECML-PKDD’18, Proceedings of the 7th International Workshop on New Frontiers in Mining Complex Patterns (NFMCP’18), in-conjunction with ECML-PKDD’18, Proceedings of the 7th International Workshop on New Frontiers in Mining Complex Patterns (NFMCP’18), in-conjunction with ECML-PKDD’18
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems
Subhash Lakshminarayana, , Zhan-Teng Teo, Rui Tan, David K. Y. Yau, 2018, In ACM Trans. Cyber-Physical Systems (TCPS), 2(4), September 2018, In ACM Trans. Cyber-Physical Systems (TCPS), 2(4), September 2018, In ACM Trans. Cyber-Physical Systems (TCPS), 2(4), September 2018, In ACM Trans. Cyber-Physical Systems (TCPS), 2(4), September 2018, https://people.sutd.edu.sg/~david_yau/publications/subhash2018tcps.pdf
Optimal-Cost Scheduling of Electrical Vehicle Charging under Uncertainty
Yaqin Zhou, David K. Y. Yau, Pengcheng You, Peng Cheng, 2018, IEEE Transactions on Smart Grid, 9(5), September 2018, IEEE Transactions on Smart Grid, 9(5), September 2018, IEEE Transactions on Smart Grid, 9(5), September 2018, IEEE Transactions on Smart Grid, 9(5), September 2018, https://people.sutd.edu.sg/~david_yau/publications/zhou2017tsg.pdf
RAPID: Real-time Analytics Platform for Interactive Data Mining
Kwan Hui Lim, Sachini Jayasekara, Shanika Karunasekera, Aaron Harwood, Lucia Falzon, John Dunn, Glenn Burgess, 2018, Proceedings of the 2018 European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’18), Demonstration Track, Proceedings of the 2018 European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’18), Demonstration Track, Proceedings of the 2018 European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’18), Demonstration Track, Proceedings of the 2018 European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’18), Demonstration Track, Proceedings of the 2018 European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’18), Demonstration Track, Proceedings of the 2018 European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’18), Demonstration Track, Proceedings of the 2018 European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’18), Demonstration Track
Secure Communications for the Two-user Broadcast Channel with Random Traffic
P. Mohapatra, N. Pappas, J. Lee, T. Q. S. Quek, V. Angelakis, 2018, IEEE Trans. Information Forensics, and Security, vol. 13, no. 9, pp. 2294–2309, Sep. 2018, IEEE Trans. Information Forensics, and Security, vol. 13, no. 9, pp. 2294–2309, Sep. 2018, IEEE Trans. Information Forensics, and Security, vol. 13, no. 9, pp. 2294–2309, Sep. 2018, IEEE Trans. Information Forensics, and Security, vol. 13, no. 9, pp. 2294–2309, Sep. 2018, IEEE Trans. Information Forensics, and Security, vol. 13, no. 9, pp. 2294–2309, Sep. 2018
Visual Field Visualizer: Easier & Scalable Way to be Aware of the Visual Field (Poster paper)
2018
A UTP semantics for communicating processes with shared variables and its formal encoding in PVS
Ling Shi, Yongxin Zhao, Yang Liu, Jun Sun, Jin Song Dong, Shengchao Qin, 2018, Formal Asp. Comput. 30(3-4): 351-380 (2018), Formal Asp. Comput. 30(3-4): 351-380 (2018), Formal Asp. Comput. 30(3-4): 351-380 (2018), Formal Asp. Comput. 30(3-4): 351-380 (2018), Formal Asp. Comput. 30(3-4): 351-380 (2018), Formal Asp. Comput. 30(3-4): 351-380 (2018), https://dl.acm.org/doi/10.1007/s00165-018-0453-7