<?xml version="1.0"?>
<dblpperson name="Yang-Wai Chow" pid="27/1663" n="80">
<person key="homepages/27/1663" mdate="2019-05-23">
<author pid="27/1663">Yang-Wai Chow</author>
<url>https://orcid.org/0000-0003-3348-7014</url>
<url>https://www.wikidata.org/entity/Q59277685</url>
</person>
<r><article key="journals/csi/NguyenDSCT26" mdate="2025-11-02">
<author orcid="0009-0000-1450-7337" pid="364/1194">Duy Tung Khanh Nguyen</author>
<author orcid="0000-0001-8057-4060" pid="179/6837">Dung Hoang Duong</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="330/1728">The Anh Ta</author>
<title>HEArgmax: Secure homomorphic encryption-based protocols for Argmax function.</title>
<pages>104071</pages>
<year>2026</year>
<volume>96</volume>
<journal>Comput. Stand. Interfaces</journal>
<ee type="oa">https://doi.org/10.1016/j.csi.2025.104071</ee>
<url>db/journals/csi/csi96.html#NguyenDSCT26</url>
<stream>streams/journals/csi</stream>
</article>
</r>
<r><article key="journals/fi/MukherjeeLC25" mdate="2025-05-09">
<author orcid="0009-0004-8295-1156" pid="312/4224">Madhav Mukherjee</author>
<author orcid="0000-0003-0019-0345" pid="48/10919">John Le</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Generative AI-Enhanced Intelligent Tutoring System for Graduate Cybersecurity Programs.</title>
<pages>154</pages>
<year>2025</year>
<volume>17</volume>
<journal>Future Internet</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.3390/fi17040154</ee>
<url>db/journals/fi/fi17.html#MukherjeeLC25</url>
<stream>streams/journals/fi</stream>
</article>
</r>
<r><article key="journals/fi/LiZCS25" mdate="2026-02-01">
<author orcid="0009-0008-9976-1753" pid="181/2820">Jing Li</author>
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Mitigating Class Imbalance in Network Intrusion Detection with Feature-Regularized GANs.</title>
<pages>216</pages>
<year>2025</year>
<volume>17</volume>
<journal>Future Internet</journal>
<number>5</number>
<ee type="oa">https://doi.org/10.3390/fi17050216</ee>
<url>db/journals/fi/fi17.html#LiZCS25</url>
<stream>streams/journals/fi</stream>
</article>
</r>
<r><article key="journals/ijmi/ShojaeiVC25" mdate="2025-05-01">
<author pid="369/7735">Parisasadat Shojaei</author>
<author pid="19/10042">Elena Vlahu-Gjorgievska</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Enhancing privacy in mHealth Applications: A User-Centric model identifying key factors influencing Privacy-Related behaviours.</title>
<pages>105907</pages>
<year>2025</year>
<volume>199</volume>
<journal>Int. J. Medical Informatics</journal>
<ee>https://doi.org/10.1016/j.ijmedinf.2025.105907</ee>
<url>db/journals/ijmi/ijmi199.html#ShojaeiVC25</url>
<stream>streams/journals/ijmi</stream>
</article>
</r>
<r><article key="journals/iot/KhajehaliYCF25" mdate="2025-10-14">
<author orcid="0000-0003-4687-7716" pid="210/7237">Naghmeh Khajehali</author>
<author orcid="0000-0002-6474-1049" pid="89/5901-5">Jun Yan 0005</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="18/10134">Mahdi Fahmideh</author>
<title>Pow-MUCB: A new client selection method based on Pow-d and modified UCB for federated learning in IoT.</title>
<pages>101687</pages>
<year>2025</year>
<volume>33</volume>
<journal>Internet Things</journal>
<ee>https://doi.org/10.1016/j.iot.2025.101687</ee>
<url>db/journals/iot/iot33.html#KhajehaliYCF25</url>
<stream>streams/journals/iot</stream>
</article>
</r>
<r><article key="journals/jair/YuZSCS25" mdate="2025-12-07">
<author orcid="0009-0004-1522-1065" pid="211/7215">Yiding Yu</author>
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author pid="84/8730">Wenjing Su</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Detecting Generative Model Inversion Attacks for Protecting Intellectual Property of Deep Neural Networks.</title>
<year>2025</year>
<volume>84</volume>
<journal>J. Artif. Intell. Res.</journal>
<ee type="oa">https://doi.org/10.1613/jair.1.19468</ee>
<url>db/journals/jair/jair84.html#YuZSCS25</url>
<stream>streams/journals/jair</stream>
</article>
</r>
<r><inproceedings key="conf/aisec-ws/TroianiSCL25" mdate="2026-02-10">
<author orcid="0009-0006-0660-2872" pid="424/3856">Christian Troiani</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-4407-9027" pid="136/0901">Yannan Li 0001</author>
<title>Federated Unlearning using Tree-based Sharding.</title>
<pages>111-122</pages>
<year>2025</year>
<booktitle>AISec@CCS</booktitle>
<ee>https://doi.org/10.1145/3733799.3762971</ee>
<crossref>conf/aisec-ws/2025</crossref>
<url>db/conf/aisec-ws/aisec2025.html#TroianiSCL25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/medinfo/ShojaeiCV25" mdate="2026-03-31">
<author orcid="0009-0001-0509-3686" pid="369/7735">Parisasadat Shojaei</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0001-6160-5343" pid="19/10042">Elena Vlahu-Gjorgievska</author>
<title>User Privacy Concerns and Preferences in mHealth Applications: Balancing Privacy and Usability.</title>
<pages>229-233</pages>
<year>2025</year>
<booktitle>MedInfo</booktitle>
<ee>https://doi.org/10.3233/SHTI250835</ee>
<crossref>conf/medinfo/2025</crossref>
<url>db/conf/medinfo/medinfo2025.html#ShojaeiCV25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/ZongCSBC25" mdate="2025-10-31">
<author pid="145/0551">Wei Zong</author>
<author pid="27/1663">Yang-Wai Chow</author>
<author pid="12/3447">Willy Susilo</author>
<author pid="36/5899">Joonsang Baek</author>
<author pid="55/3548">Seyit Camtepe</author>
<title>AudioMarkNet: Audio Watermarking for Deepfake Speech Detection.</title>
<pages>4663-4682</pages>
<year>2025</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity25/presentation/zong</ee>
<crossref>conf/uss/2025</crossref>
<url>db/conf/uss/uss2025.html#ZongCSBC25</url>
</inproceedings>
</r>
<r><article key="journals/behaviourIT/PhillipsCRB24" mdate="2025-11-02">
<author orcid="0000-0002-3125-4009" pid="73/651">James G. Phillips</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="394/4776">Heather Rogers</author>
<author pid="14/9917">Alex Blaszczynski</author>
<title>The search term 'suicide' is being used to lead web browsers to online casinos.</title>
<pages>4033-4044</pages>
<year>2024</year>
<month>December</month>
<volume>43</volume>
<journal>Behav. Inf. Technol.</journal>
<number>16</number>
<ee>https://doi.org/10.1080/0144929x.2023.2298307</ee>
<ee>https://www.wikidata.org/entity/Q135912836</ee>
<url>db/journals/behaviourIT/behaviourIT43.html#PhillipsCRB24</url>
<stream>streams/journals/behaviourIT</stream>
</article>
</r>
<r><article key="journals/computers/ShojaeiVC24" mdate="2025-01-19">
<author pid="369/7735">Parisasadat Shojaei</author>
<author orcid="0000-0001-6160-5343" pid="19/10042">Elena Vlahu-Gjorgievska</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review.</title>
<pages>41</pages>
<year>2024</year>
<volume>13</volume>
<journal>Comput.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.3390/computers13020041</ee>
<ee>https://www.wikidata.org/entity/Q128994126</ee>
<url>db/journals/computers/computers13.html#ShojaeiVC24</url>
</article>
</r>
<r><article key="journals/information/MukherjeeLCS24" mdate="2024-08-10">
<author orcid="0009-0004-8295-1156" pid="312/4224">Madhav Mukherjee</author>
<author pid="193/0348">Ngoc-Thuy Le</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes.</title>
<pages>117</pages>
<year>2024</year>
<month>February</month>
<volume>15</volume>
<journal>Inf.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.3390/info15020117</ee>
<url>db/journals/information/information15.html#MukherjeeLCS24</url>
</article>
</r>
<r><inproceedings key="conf/aaai/ZongCSBKC24" mdate="2025-03-03">
<author pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0001-6353-8359" pid="55/3548">Seyit Camtepe</author>
<title>IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.</title>
<pages>7837-7845</pages>
<year>2024</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v38i7.28619</ee>
<crossref>conf/aaai/2024</crossref>
<url>db/conf/aaai/aaai2024.html#ZongCSBKC24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/apweb/JiangYXCCZ24" mdate="2025-01-03">
<author pid="68/9608">Yuanyuan Jiang</author>
<author orcid="0000-0002-2032-7727" pid="316/0485">Jianke Yu</author>
<author pid="384/5393">Zhangyi Xu</author>
<author pid="65/4423-17">Chen Chen 0017</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="13/6769-1">Ying Zhang 0001</author>
<title>SBGMN: A Multi-view Sign Prediction Network for Bipartite Graphs.</title>
<pages>81-96</pages>
<year>2024</year>
<booktitle>APWeb/WAIM (3)</booktitle>
<ee>https://doi.org/10.1007/978-981-97-7238-4_6</ee>
<crossref>conf/apweb/2024-3</crossref>
<url>db/conf/apweb/apweb2024-3.html#JiangYXCCZ24</url>
<stream>streams/conf/apweb</stream>
</inproceedings>
</r>
<r><article key="journals/fi/NguyenDSCT23" mdate="2025-09-26">
<author pid="364/1194">Duy Tung Khanh Nguyen</author>
<author pid="179/6837">Dung Hoang Duong</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="330/1728">The Anh Ta</author>
<title>HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference.</title>
<pages>407</pages>
<year>2023</year>
<volume>15</volume>
<journal>Future Internet</journal>
<number>12</number>
<ee type="oa">https://doi.org/10.3390/fi15120407</ee>
<url>db/journals/fi/fi15.html#NguyenDSCT23</url>
</article>
</r>
<r><article key="journals/jimaging/ChowSLLN23" mdate="2026-02-10">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0002-4407-9027" pid="136/0901">Yannan Li 0001</author>
<author pid="84/3795-7">Nan Li 0007</author>
<author pid="54/2608">Chau Nguyen</author>
<title>Visualization and Cybersecurity in the Metaverse: A Survey.</title>
<pages>11</pages>
<year>2023</year>
<month>January</month>
<volume>9</volume>
<journal>J. Imaging</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.3390/jimaging9010011</ee>
<url>db/journals/jimaging/jimaging9.html#ChowSLLN23</url>
</article>
</r>
<r><article key="journals/sensors/KhajehaliYCF23" mdate="2024-05-07">
<author orcid="0000-0003-4687-7716" pid="210/7237">Naghmeh Khajehali</author>
<author orcid="0000-0002-6474-1049" pid="89/5901-5">Jun Yan 0005</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0001-7196-7217" pid="18/10134">Mahdi Fahmideh</author>
<title>A Comprehensive Overview of IoT-Based Federated Learning: Focusing on Client Selection Methods.</title>
<pages>7235</pages>
<year>2023</year>
<month>August</month>
<volume>23</volume>
<journal>Sensors</journal>
<number>16</number>
<ee type="oa">https://doi.org/10.3390/s23167235</ee>
<url>db/journals/sensors/sensors23.html#KhajehaliYCF23</url>
</article>
</r>
<r><article key="journals/tifs/KimSBKC23" mdate="2023-06-02">
<author orcid="0000-0001-8603-4401" pid="41/3805">Intae Kim</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author orcid="0000-0001-5755-108X" pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>PCSF: Privacy-Preserving Content-Based Spam Filter.</title>
<pages>2856-2869</pages>
<year>2023</year>
<volume>18</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<ee>https://doi.org/10.1109/TIFS.2023.3255172</ee>
<url>db/journals/tifs/tifs18.html#KimSBKC23</url>
</article>
</r>
<r><inproceedings key="conf/pricai/RazaliHCND23" mdate="2023-11-28">
<author orcid="0000-0003-0934-286X" pid="292/5968">Md Saifullah Razali</author>
<author orcid="0000-0002-0318-4496" pid="54/7607">Alfian Abdul Halin</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0001-7420-5867" pid="19/3131">Noris Mohd Norowi</author>
<author orcid="0000-0001-5502-8754" pid="38/8875">Shyamala Doraisamy</author>
<title>Sarcasm Relation to Time: Sarcasm Detection with Temporal Features and Deep Learning.</title>
<pages>287-297</pages>
<year>2023</year>
<booktitle>PRICAI (2)</booktitle>
<ee>https://doi.org/10.1007/978-981-99-7022-3_25</ee>
<crossref>conf/pricai/2023-2</crossref>
<url>db/conf/pricai/pricai2023-2.html#RazaliHCND23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/NguyenDSC23" mdate="2025-05-01">
<author pid="364/1194">Duy Tung Khanh Nguyen</author>
<author pid="179/6837">Dung Hoang Duong</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference.</title>
<pages>413-438</pages>
<year>2023</year>
<booktitle>SecureComm (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-64948-6_21</ee>
<crossref>conf/securecomm/2023-1</crossref>
<url>db/conf/securecomm/securecomm2023-1.html#NguyenDSC23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/ZongCSDV23" mdate="2024-05-07">
<author pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0002-0119-122X" pid="185/0836">Kien Do</author>
<author pid="81/1984">Svetha Venkatesh</author>
<title>TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems.</title>
<pages>1667-1683</pages>
<year>2023</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP46215.2023.10179331</ee>
<crossref>conf/sp/2023</crossref>
<url>db/conf/sp/sp2023.html#ZongCSDV23</url>
</inproceedings>
</r>
<r><article key="journals/access/RazaliHCND22" mdate="2023-11-16">
<author orcid="0000-0003-0934-286X" pid="292/5968">Md Saifullah Razali</author>
<author orcid="0000-0002-0318-4496" pid="54/7607">Alfian Abdul Halin</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0001-7420-5867" pid="19/3131">Noris Mohd Norowi</author>
<author orcid="0000-0001-5502-8754" pid="38/8875">Shyamala Doraisamy</author>
<title>Context-Driven Satire Detection With Deep Learning.</title>
<pages>78780-78787</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2022.3194119</ee>
<url>db/journals/access/access10.html#RazaliHCND22</url>
</article>
</r>
<r><article key="journals/cryptography/KimCSBK22" mdate="2025-03-03">
<author pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author orcid="0000-0001-8603-4401" pid="41/3805">Intae Kim</author>
<title>Functional Encryption for Pattern Matching with a Hidden String.</title>
<pages>1</pages>
<year>2022</year>
<volume>6</volume>
<journal>Cryptogr.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.3390/cryptography6010001</ee>
<ee>https://www.wikidata.org/entity/Q114844998</ee>
<url>db/journals/cryptography/cryptography6.html#KimCSBK22</url>
</article>
</r>
<r><article key="journals/jimaging/ZongCSKL22" mdate="2024-08-10">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0001-5755-108X" pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0003-0019-0345" pid="193/0348">Ngoc-Thuy Le</author>
<title>Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns.</title>
<pages>324</pages>
<year>2022</year>
<month>December</month>
<volume>8</volume>
<journal>J. Imaging</journal>
<number>12</number>
<ee type="oa">https://doi.org/10.3390/jimaging8120324</ee>
<url>db/journals/jimaging/jimaging8.html#ZongCSKL22</url>
</article>
</r>
<r><article key="journals/tcs/Thorncharoensri22" mdate="2022-06-23">
<author orcid="0000-0002-1465-2718" pid="73/3923">Pairat Thorncharoensri</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Privacy-preserving file sharing on cloud storage with certificateless signcryption.</title>
<pages>1-21</pages>
<year>2022</year>
<volume>916</volume>
<journal>Theor. Comput. Sci.</journal>
<ee>https://doi.org/10.1016/j.tcs.2022.02.033</ee>
<url>db/journals/tcs/tcs916.html#Thorncharoensri22</url>
</article>
</r>
<r><inproceedings key="conf/css/ZongCS22" mdate="2022-10-18">
<author pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>High Quality Audio Adversarial Examples Without Using Psychoacoustics.</title>
<pages>163-177</pages>
<year>2022</year>
<booktitle>CSS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-18067-5_12</ee>
<crossref>conf/css/2022</crossref>
<url>db/conf/css/css2022.html#ZongCS22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobisec2/ShoaibCVN22" mdate="2023-07-21">
<author orcid="0000-0003-0884-6265" pid="352/0968">Faizan Shoaib</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0001-6160-5343" pid="19/10042">Elena Vlahu-Gjorgievska</author>
<author orcid="0000-0001-9489-2035" pid="54/2608">Chau Nguyen</author>
<title>Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN.</title>
<pages>180-194</pages>
<year>2022</year>
<booktitle>MobiSec</booktitle>
<ee>https://doi.org/10.1007/978-981-99-4430-9_13</ee>
<crossref>conf/mobisec2/2022</crossref>
<url>db/conf/mobisec2/mobisec2022.html#ShoaibCVN22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisa/KimSBKC22" mdate="2023-02-25">
<author orcid="0000-0001-8603-4401" pid="41/3805">Intae Kim</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author orcid="0000-0001-5755-108X" pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>TLS Goes Low Cost: When TLS Meets Edge.</title>
<pages>102-113</pages>
<year>2022</year>
<booktitle>WISA</booktitle>
<ee>https://doi.org/10.1007/978-3-031-25659-2_8</ee>
<crossref>conf/wisa/2022</crossref>
<url>db/conf/wisa/wisa2022.html#KimSBKC22</url>
</inproceedings>
</r>
<r><article key="journals/jnca/ChowSWBBKL21" mdate="2025-05-01">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0001-5297-0293" pid="65/4872-1">Jianfeng Wang 0001</author>
<author pid="81/1527">Richard Buckland</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0002-9351-2800" pid="84/3795-7">Nan Li 0007</author>
<title>Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.</title>
<pages>102834</pages>
<year>2021</year>
<volume>173</volume>
<journal>J. Netw. Comput. Appl.</journal>
<ee>https://doi.org/10.1016/j.jnca.2020.102834</ee>
<url>db/journals/jnca/jnca173.html#ChowSWBBKL21</url>
</article>
</r>
<r><article key="journals/jowua/ChowSBKZ21" mdate="2025-03-03">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<title>Exploiting QR Code Error Correction for Digital Image Watermarking.</title>
<pages>114-140</pages>
<year>2021</year>
<volume>12</volume>
<journal>J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.22667/JOWUA.2021.06.30.114</ee>
<url>db/journals/jowua/jowua12.html#ChowSBKZ21</url>
</article>
</r>
<r><inproceedings key="conf/acisp/ZongCS21" mdate="2022-10-02">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition.</title>
<pages>531-549</pages>
<year>2021</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-030-90567-5_27</ee>
<crossref>conf/acisp/2021</crossref>
<url>db/conf/acisp/acisp2021.html#ZongCS21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/PhuongSYKCL21" mdate="2022-01-03">
<author pid="148/1452">Tran Viet Xuan Phuong</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0002-4949-7738" pid="78/2235">Guomin Yang</author>
<author pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="18/477">Dongxi Liu</author>
<title>SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.</title>
<pages>106-126</pages>
<year>2021</year>
<booktitle>ESORICS (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-88428-4_6</ee>
<crossref>conf/esorics/2021-2</crossref>
<url>db/conf/esorics/esorics2021-2.html#PhuongSYKCL21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/ZongCS21" mdate="2022-10-02">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Black-Box Audio Adversarial Example Generation Using Variational Autoencoder.</title>
<pages>142-160</pages>
<year>2021</year>
<booktitle>ICICS (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-88052-1_9</ee>
<crossref>conf/icics/2021-2</crossref>
<url>db/conf/icics/icics2021-2.html#ZongCS21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/ZongCSRV21" mdate="2022-10-02">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2247-850X" pid="57/6712">Santu Rana</author>
<author orcid="0000-0001-8675-6631" pid="81/1984">Svetha Venkatesh</author>
<title>Targeted Universal Adversarial Perturbations for Automatic Speech Recognition.</title>
<pages>358-373</pages>
<year>2021</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-030-91356-4_19</ee>
<crossref>conf/isw/2021</crossref>
<url>db/conf/isw/isc2021.html#ZongCSRV21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobisec2/ZongCSK21" mdate="2022-10-02">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0001-5755-108X" pid="140/2998">Jongkil Kim</author>
<title>Trojan Attacks and Defense for Speech Recognition.</title>
<pages>195-210</pages>
<year>2021</year>
<booktitle>MobiSec</booktitle>
<ee>https://doi.org/10.1007/978-981-16-9576-6_14</ee>
<crossref>conf/mobisec2/2021</crossref>
<url>db/conf/mobisec2/mobisec2021.html#ZongCSK21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisa/KimSCBK21" mdate="2025-03-03">
<author pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author orcid="0000-0001-8603-4401" pid="41/3805">Intae Kim</author>
<title>Pattern Matching over Encrypted Data with a Short Ciphertext.</title>
<pages>132-143</pages>
<year>2021</year>
<booktitle>WISA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-89432-0_11</ee>
<crossref>conf/wisa/2021</crossref>
<url>db/conf/wisa/wisa2021.html#KimSCBK21</url>
</inproceedings>
</r>
<r><article key="journals/fgcs/ZongCS20" mdate="2025-01-19">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Interactive three-dimensional visualization of network intrusion detection data for machine learning.</title>
<pages>292-306</pages>
<year>2020</year>
<volume>102</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2019.07.045</ee>
<ee>https://www.wikidata.org/entity/Q127408992</ee>
<url>db/journals/fgcs/fgcs102.html#ZongCS20</url>
</article>
</r>
<r><article key="journals/access/BaekSKC19" mdate="2020-10-26">
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0001-5755-108X" pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Subversion in Practice: How to Efficiently Undermine Signatures.</title>
<pages>68799-68811</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2918550</ee>
<url>db/journals/access/access7.html#BaekSKC19</url>
</article>
</r>
<r><inproceedings key="conf/acisp/ZongCS19" mdate="2022-10-02">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Dimensionality Reduction and Visualization of Network Intrusion Detection Data.</title>
<pages>441-455</pages>
<year>2019</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-030-21548-4_24</ee>
<crossref>conf/acisp/2019</crossref>
<url>db/conf/acisp/acisp2019.html#ZongCS19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ml4cs/ChowSWBBK019" mdate="2025-05-01">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0001-5297-0293" pid="65/4872-1">Jianfeng Wang 0001</author>
<author pid="81/1527">Richard Buckland</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author orcid="0000-0001-5755-108X" pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0002-9351-2800" pid="84/3795-7">Nan Li 0007</author>
<title>Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.</title>
<pages>320-335</pages>
<year>2019</year>
<booktitle>ML4CS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-30619-9_23</ee>
<crossref>conf/ml4cs/2019</crossref>
<url>db/conf/ml4cs/ml4cs2019.html#ChowSWBBK019</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisa/ChowSBK19" mdate="2025-03-03">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author orcid="0000-0001-5755-108X" pid="140/2998">Jongkil Kim</author>
<title>QR Code Watermarking for Digital Images.</title>
<pages>25-37</pages>
<year>2019</year>
<booktitle>WISA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-39303-8_3</ee>
<crossref>conf/wisa/2019</crossref>
<url>db/conf/wisa/wisa2019.html#ChowSBK19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisa/KimBSC19" mdate="2025-03-03">
<author orcid="0000-0001-5755-108X" pid="140/2998">Jongkil Kim</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.</title>
<pages>206-216</pages>
<year>2019</year>
<booktitle>WISA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-39303-8_16</ee>
<crossref>conf/wisa/2019</crossref>
<url>db/conf/wisa/wisa2019.html#KimBSC19</url>
</inproceedings>
</r>
<r><incollection key="books/sp/18/ChowST19" mdate="2021-10-14">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0002-1465-2718" pid="73/3923">Pairat Thorncharoensri</author>
<title>CAPTCHA Design and Security Issues.</title>
<pages>69-92</pages>
<year>2019</year>
<booktitle>Advances in Cyber Security</booktitle>
<ee>https://doi.org/10.1007/978-981-13-1483-4_4</ee>
<crossref>books/sp/LCS2019</crossref>
<url>db/books/collections/LCS2019.html#ChowST19</url>
</incollection>
</r>
<r><article key="journals/symmetry/ChowSTVY18" mdate="2020-09-05">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2846-1071" pid="182/6184">Joseph Tonien</author>
<author orcid="0000-0001-6160-5343" pid="19/10042">Elena Vlahu-Gjorgievska</author>
<author orcid="0000-0002-4949-7738" pid="78/2235">Guomin Yang</author>
<title>Cooperative Secret Sharing Using QR Codes and Symmetric Keys.</title>
<pages>95</pages>
<year>2018</year>
<volume>10</volume>
<journal>Symmetry</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.3390/sym10040095</ee>
<ee>https://www.wikidata.org/entity/Q60608420</ee>
<url>db/journals/symmetry/symmetry10.html#ChowSTVY18</url>
</article>
</r>
<r><inproceedings key="conf/cw/ZongCS18" mdate="2022-10-02">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>A 3D Approach for the Visualization of Network Intrusion Detection Data.</title>
<pages>308-315</pages>
<year>2018</year>
<booktitle>CW</booktitle>
<ee>https://doi.org/10.1109/CW.2018.00064</ee>
<crossref>conf/cw/2018</crossref>
<url>db/conf/cw/cw2018.html#ZongCS18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/BrownZC18" mdate="2022-05-04">
<author pid="220/4785">Joshua Brown 0005</author>
<author pid="77/5181">Zhi Quan Zhou</author>
<author pid="27/1663">Yang-Wai Chow</author>
<title>Metamorphic Testing of Navigation Software: A Pilot Study with Google Maps.</title>
<year>2018</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://hdl.handle.net/10125/50602</ee>
<ee>http://aisel.aisnet.org/hicss-51/st/mobile_app_development/2</ee>
<crossref>conf/hicss/2018</crossref>
<url>db/conf/hicss/hicss2018.html#BrownZC18</url>
<pages>1-10</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/ZongCS18" mdate="2022-10-02">
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>A Two-Stage Classifier Approach for Network Intrusion Detection.</title>
<pages>329-340</pages>
<year>2018</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-99807-7_20</ee>
<crossref>conf/ispec/2018</crossref>
<url>db/conf/ispec/ispec2018.html#ZongCS18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BaekSKC18" mdate="2020-05-11">
<author pid="36/5899">Joonsang Baek</author>
<author pid="12/3447">Willy Susilo</author>
<author pid="140/2998">Jongkil Kim</author>
<author pid="27/1663">Yang-Wai Chow</author>
<title>Subversion in Practice: How to Efficiently Undermine Signatures.</title>
<pages>1201</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2018/1201</ee>
<url>db/journals/iacr/iacr2018.html#BaekSKC18</url>
</article>
</r>
<r><article key="journals/jowua/ChowSPBV17" mdate="2025-03-03">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author pid="73/651">James G. Phillips</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<author pid="19/10042">Elena Vlahu-Gjorgievska</author>
<title>Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview.</title>
<pages>18-35</pages>
<year>2017</year>
<volume>8</volume>
<journal>J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.22667/JOWUA.2017.09.30.018</ee>
<url>db/journals/jowua/jowua8.html#ChowSPBV17</url>
</article>
</r>
<r><inproceedings key="conf/acisp/ChowSTZ17" mdate="2022-10-02">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2846-1071" pid="182/6184">Joseph Tonien</author>
<author orcid="0000-0001-9714-6759" pid="145/0551">Wei Zong</author>
<title>A QR Code Watermarking Approach Based on the DWT-DCT Technique.</title>
<pages>314-331</pages>
<year>2017</year>
<booktitle>ACISP (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-59870-3_18</ee>
<crossref>conf/acisp/2017-2</crossref>
<url>db/conf/acisp/acisp2017-2.html#ChowSTZ17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atis/KedzioraCS17" mdate="2021-10-14">
<author pid="97/10224">Michal Kedziora</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems.</title>
<pages>3-13</pages>
<year>2017</year>
<booktitle>ATIS</booktitle>
<ee>https://doi.org/10.1007/978-981-10-5421-1_1</ee>
<crossref>conf/atis/2017</crossref>
<url>db/conf/atis/atis2017.html#KedzioraCS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cdve/ChowSY17" mdate="2021-10-14">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0002-4949-7738" pid="78/2235">Guomin Yang</author>
<title>Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts.</title>
<pages>65-72</pages>
<year>2017</year>
<booktitle>CDVE</booktitle>
<ee>https://doi.org/10.1007/978-3-319-66805-5_8</ee>
<crossref>conf/cdve/2017</crossref>
<url>db/conf/cdve/cdve2017.html#ChowSY17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/ChowSB17" mdate="2025-03-03">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2613-2127" pid="36/5899">Joonsang Baek</author>
<title>Covert QR Codes: How to Hide in the Crowd.</title>
<pages>678-693</pages>
<year>2017</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-72359-4_42</ee>
<crossref>conf/ispec/2017</crossref>
<url>db/conf/ispec/ispec2017.html#ChowSB17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/ChowSYPPB16" mdate="2021-10-14">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0002-4949-7738" pid="78/2235">Guomin Yang</author>
<author pid="73/651">James G. Phillips</author>
<author pid="98/10307">Ilung Pranata</author>
<author pid="12/5753">Ari Moesriami Barmawi</author>
<title>Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.</title>
<pages>409-425</pages>
<year>2016</year>
<booktitle>ACISP (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-40253-6_25</ee>
<crossref>conf/acisp/2016-1</crossref>
<url>db/conf/acisp/acisp2016-1.html#ChowSYPPB16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/SusiloCGYMC16" mdate="2025-01-19">
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author pid="164/2718">Rongmao Chen</author>
<author orcid="0000-0001-6939-7710" pid="13/93">Fuchun Guo</author>
<author orcid="0000-0002-4949-7738" pid="78/2235">Guomin Yang</author>
<author pid="m/YiMu">Yi Mu 0001</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.</title>
<pages>201-210</pages>
<year>2016</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/2897845.2897848</ee>
<ee>https://www.wikidata.org/entity/Q130841470</ee>
<crossref>conf/ccs/2016asia</crossref>
<url>db/conf/ccs/asiaccs2016.html#SusiloCGYMC16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spaccs/ChowSYAW16" mdate="2021-10-14">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0002-4949-7738" pid="78/2235">Guomin Yang</author>
<author orcid="0000-0003-2068-9530" pid="55/24">Man Ho Au</author>
<author orcid="0000-0003-0547-315X" pid="18/2771-1">Cong Wang 0001</author>
<title>Authentication and Transaction Verification Using QR Codes with a Mobile Device.</title>
<pages>437-451</pages>
<year>2016</year>
<booktitle>SpaCCS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-49148-6_36</ee>
<crossref>conf/spaccs/2016</crossref>
<url>db/conf/spaccs/spaccs2016.html#ChowSYAW16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/LiuLOC16" mdate="2023-09-30">
<author pid="80/1141">Song Liu</author>
<author pid="57/3330">Wanqing Li 0001</author>
<author orcid="0000-0003-4119-2873" pid="09/325">Philip Ogunbona</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Creating Simplified 3D Models with High Quality Textures.</title>
<year>2016</year>
<volume>abs/1602.06645</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1602.06645</ee>
<url>db/journals/corr/corr1602.html#LiuLOC16</url>
</article>
</r>
<r><article key="journals/ijcse/SusiloCW15" mdate="2021-10-14">
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="26/2117">Rungrat Wiangsripanawan</author>
<title>Protecting peer-to-peer-based massively multiplayer online games.</title>
<pages>293-305</pages>
<year>2015</year>
<volume>10</volume>
<journal>Int. J. Comput. Sci. Eng.</journal>
<number>3</number>
<ee>https://doi.org/10.1504/IJCSE.2015.068837</ee>
<url>db/journals/ijcse/ijcse10.html#SusiloCW15</url>
</article>
</r>
<r><inproceedings key="conf/dicta/LiuLOC15" mdate="2022-03-17">
<author pid="80/1141">Song Liu</author>
<author orcid="0000-0002-4427-2687" pid="57/3330">Wanqing Li 0001</author>
<author orcid="0000-0003-4119-2873" pid="09/325">Philip Ogunbona</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<title>Creating Simplified 3D Models with High Quality Textures.</title>
<pages>1-8</pages>
<year>2015</year>
<booktitle>DICTA</booktitle>
<ee>https://doi.org/10.1109/DICTA.2015.7371249</ee>
<crossref>conf/dicta/2015</crossref>
<url>db/conf/dicta/dicta2015.html#LiuLOC15</url>
</inproceedings>
</r>
<r><article key="journals/cbsn/PhillipsSOCB14" mdate="2024-10-06">
<author pid="73/651">James G. Phillips</author>
<author orcid="0009-0008-9860-975X" pid="155/9589">James Sargeant</author>
<author pid="132/6095">Rowan P. Ogeil</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="14/9917">Alex Blaszczynski</author>
<title>Self-Reported Gambling Problems and Digital Traces.</title>
<pages>742-748</pages>
<year>2014</year>
<volume>17</volume>
<journal>Cyberpsychology Behav. Soc. Netw.</journal>
<number>12</number>
<ee>https://doi.org/10.1089/cyber.2014.0369</ee>
<ee>https://www.wikidata.org/entity/Q40236456</ee>
<url>db/journals/cbsn/cbsn17.html#PhillipsSOCB14</url>
</article>
</r>
<r><article key="journals/compsec/NguyenCS14" mdate="2023-08-28">
<author pid="70/10592">Vu Duc Nguyen</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>On the security of text-based 3D CAPTCHAs.</title>
<pages>84-99</pages>
<year>2014</year>
<volume>45</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2014.05.004</ee>
<ee>https://www.wikidata.org/entity/Q115060730</ee>
<url>db/journals/compsec/compsec45.html#NguyenCS14</url>
</article>
</r>
<r><inproceedings key="conf/icics/ChowSAB14" mdate="2021-10-14">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-2068-9530" pid="55/24">Man Ho Au</author>
<author pid="12/5753">Ari Moesriami Barmawi</author>
<title>A Visual One-Time Password Authentication Scheme Using Mobile Devices.</title>
<pages>243-257</pages>
<year>2014</year>
<booktitle>ICICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-21966-0_18</ee>
<crossref>conf/icics/2014</crossref>
<url>db/conf/icics/icics2014.html#ChowSAB14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/NguyenCS14" mdate="2021-10-14">
<author pid="70/10592">Vu Duc Nguyen</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>A CAPTCHA Scheme Based on the Identification of Character Locations.</title>
<pages>60-74</pages>
<year>2014</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-06320-1_6</ee>
<crossref>conf/ispec/2014</crossref>
<url>db/conf/ispec/ispec2014.html#NguyenCS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/NguyenCS12" mdate="2021-10-14">
<author pid="70/10592">Vu Duc Nguyen</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Breaking an Animated CAPTCHA Scheme.</title>
<pages>12-29</pages>
<year>2012</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-31284-7_2</ee>
<crossref>conf/acns/2012</crossref>
<url>db/conf/acns/acns2012.html#NguyenCS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/NguyenCS12" mdate="2021-10-14">
<author pid="70/10592">Vu Duc Nguyen</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Attacking Animated CAPTCHAs via Character Extraction.</title>
<pages>98-113</pages>
<year>2012</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35404-5_9</ee>
<crossref>conf/cans/2012</crossref>
<url>db/conf/cans/cans2012.html#NguyenCS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/ChowSW12" mdate="2021-10-14">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author pid="85/5606">Duncan S. Wong</author>
<title>Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.</title>
<pages>10-21</pages>
<year>2012</year>
<booktitle>ICICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-34129-8_2</ee>
<crossref>conf/icics/2012</crossref>
<url>db/conf/icics/icics2012.html#ChowSW12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/ChowS12" mdate="2021-10-14">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family.</title>
<pages>170-181</pages>
<year>2012</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-29101-2_12</ee>
<crossref>conf/ispec/2012</crossref>
<url>db/conf/ispec/ispec2012.html#ChowS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nss/SusiloCW12" mdate="2021-10-14">
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="26/2117">Rungrat Wiangsripanawan</author>
<title>Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games.</title>
<pages>291-304</pages>
<year>2012</year>
<booktitle>NSS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-34601-9_22</ee>
<crossref>conf/nss/2012</crossref>
<url>db/conf/nss/nss2012.html#SusiloCW12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/ChowS11" mdate="2021-10-14">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax.</title>
<pages>255-271</pages>
<year>2011</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-25513-7_18</ee>
<crossref>conf/cans/2011</crossref>
<url>db/conf/cans/cans2011.html#ChowS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/NguyenCS11" mdate="2021-10-14">
<author pid="70/10592">Vu Duc Nguyen</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<title>Breaking a 3D-Based CAPTCHA Scheme.</title>
<pages>391-405</pages>
<year>2011</year>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-31912-9_26</ee>
<crossref>conf/icisc/2011</crossref>
<url>db/conf/icisc/icisc2011.html#NguyenCS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/SusiloCZ10" mdate="2021-10-14">
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="17/8816">Hua-Yu Zhou</author>
<title>STE3D-CAP: Stereoscopic 3D CAPTCHA.</title>
<pages>221-240</pages>
<year>2010</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-17619-7_17</ee>
<crossref>conf/cans/2010</crossref>
<url>db/conf/cans/cans2010.html#SusiloCZ10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cw/ChowSZ10" mdate="2023-03-24">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author orcid="0000-0002-1562-5105" pid="12/3447">Willy Susilo</author>
<author pid="17/8816">Hua-Yu Zhou</author>
<title>CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs.</title>
<pages>254-261</pages>
<year>2010</year>
<booktitle>CW</booktitle>
<ee>https://doi.org/10.1109/CW.2010.48</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CW.2010.48</ee>
<crossref>conf/cw/2010</crossref>
<url>db/conf/cw/cw2010.html#ChowSZ10</url>
</inproceedings>
</r>
<r><article key="journals/ijvr/ChowPRP07" mdate="2021-02-25">
<author pid="27/1663">Yang-Wai Chow</author>
<author pid="64/4616">Ronald Pose</author>
<author pid="34/1048">Matthew Regan</author>
<author pid="73/651">James G. Phillips</author>
<title>The Effects of HMD Attributes, Different Display and Scene Characteristics on Human Visual Perception of Region Warping Distortions.</title>
<pages>57-68</pages>
<year>2007</year>
<volume>6</volume>
<journal>Int. J. Virtual Real.</journal>
<number>1</number>
<ee type="archive">http://www.ijvr.org/issues/issue1-2007/6.pdf</ee>
<url>db/journals/ijvr/ijvr6.html#ChowPRP07</url>
</article>
</r>
<r><phdthesis key="phd/au/Chow20" mdate="2023-02-18">
<author pid="27/1663">Yang-Wai Chow</author>
<title>The region methodology for an address recalculation pipeline virtual reality system with priority rendering.</title>
<school>Monash University, Australia</school>
<year>2006</year>
<ee>https://doi.org/10.26180/14964306.v1</ee>
</phdthesis>
</r>
<r><inproceedings key="conf/acsc/ChowPRP06" mdate="2018-11-30">
<author pid="27/1663">Yang-Wai Chow</author>
<author pid="64/4616">Ronald Pose</author>
<author pid="34/1048">Matthew Regan</author>
<author pid="73/651">James G. Phillips</author>
<title>Human visual perception of region warping distortions.</title>
<pages>217-226</pages>
<year>2006</year>
<crossref>conf/acsc/2006</crossref>
<booktitle>ACSC</booktitle>
<ee>https://dl.acm.org/citation.cfm?id=1151724</ee>
<url>db/conf/acsc/acsc2006.html#ChowPRP06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/graphite/ChowPRP06" mdate="2019-06-02">
<author orcid="0000-0003-3348-7014" pid="27/1663">Yang-Wai Chow</author>
<author pid="64/4616">Ronald Pose</author>
<author pid="34/1048">Matthew Regan</author>
<author orcid="0000-0002-3125-4009" pid="73/651">James G. Phillips</author>
<title>Human visual perception of region warping distortions with different display and scene characteristics.</title>
<pages>357-365</pages>
<year>2006</year>
<crossref>conf/graphite/2006</crossref>
<booktitle>GRAPHITE</booktitle>
<ee>https://doi.org/10.1145/1174429.1174490</ee>
<ee>https://www.wikidata.org/entity/Q61820570</ee>
<url>db/conf/graphite/graphite2006.html#ChowPRP06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsc/ChowPR05" mdate="2021-02-10">
<author pid="27/1663">Yang-Wai Chow</author>
<author pid="64/4616">Ronald Pose</author>
<author pid="34/1048">Matthew Regan</author>
<title>Large Object Segmentation with Region Priority Rendering.</title>
<pages>19-28</pages>
<year>2005</year>
<crossref>conf/acsc/2005</crossref>
<booktitle>ACSC</booktitle>
<ee type="oa">http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV38Chow.html</ee>
<url>db/conf/acsc/acsc2005.html#ChowPR05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iadis/ChowPR05b" mdate="2017-11-16">
<author pid="27/1663">Yang-Wai Chow</author>
<author pid="64/4616">Ronald Pose</author>
<author pid="34/1048">Matthew Regan</author>
<title>Design issues in human visual perception experiments on region warping.</title>
<pages>210-217</pages>
<year>2005</year>
<crossref>conf/iadis/2005ac-2</crossref>
<booktitle>IADIS AC</booktitle>
<url>db/conf/iadis/ac2005-2.html#ChowPR05b</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iadis/ChowPR05" mdate="2006-02-13">
<author pid="27/1663">Yang-Wai Chow</author>
<author pid="64/4616">Ronald Pose</author>
<author pid="34/1048">Matthew Regan</author>
<title>Region warping in a virtual reality system with priority rendering.</title>
<pages>451-458</pages>
<year>2005</year>
<crossref>conf/iadis/2005ac</crossref>
<booktitle>IADIS AC</booktitle>
<url>db/conf/iadis/ac2005-1.html#ChowPR05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iadis/ChowPR05a" mdate="2006-02-13">
<author pid="27/1663">Yang-Wai Chow</author>
<author pid="64/4616">Ronald Pose</author>
<author pid="34/1048">Matthew Regan</author>
<title>A networked virtual environment communications model using priority updating.</title>
<pages>591-598</pages>
<year>2005</year>
<crossref>conf/iadis/2005ac</crossref>
<booktitle>IADIS AC</booktitle>
<url>db/conf/iadis/ac2005-1.html#ChowPR05a</url>
</inproceedings>
</r>
<coauthors n="68" nc="3">
<co c="0"><na f="a/Au:Man_Ho" pid="55/24">Man Ho Au</na></co>
<co c="0"><na f="b/Baek:Joonsang" pid="36/5899">Joonsang Baek</na></co>
<co c="0"><na f="b/Barmawi:Ari_Moesriami" pid="12/5753">Ari Moesriami Barmawi</na></co>
<co c="0"><na f="b/Blaszczynski:Alex" pid="14/9917">Alex Blaszczynski</na></co>
<co c="2"><na f="b/Brown_0005:Joshua" pid="220/4785">Joshua Brown 0005</na></co>
<co c="0"><na f="b/Buckland:Richard" pid="81/1527">Richard Buckland</na></co>
<co c="0" n="2"><na f="=/=Ccedil=amtepe:Seyit_Ahmet" pid="55/3548">Seyit Ahmet &#199;amtepe</na><na>Seyit Camtepe</na></co>
<co c="0"><na f="c/Chen_0017:Chen" pid="65/4423-17">Chen Chen 0017</na></co>
<co c="0"><na f="c/Chen:Rongmao" pid="164/2718">Rongmao Chen</na></co>
<co c="0"><na f="d/Do:Kien" pid="185/0836">Kien Do</na></co>
<co c="1" n="2"><na f="d/Doraisamy:Shyamala_C=" pid="38/8875">Shyamala C. Doraisamy</na><na>Shyamala Doraisamy</na></co>
<co c="0"><na f="d/Duong:Dung_Hoang" pid="179/6837">Dung Hoang Duong</na></co>
<co c="0"><na f="f/Fahmideh:Mahdi" pid="18/10134">Mahdi Fahmideh</na></co>
<co c="0"><na f="g/Guo:Fuchun" pid="13/93">Fuchun Guo</na></co>
<co c="1"><na f="h/Halin:Alfian_Abdul" pid="54/7607">Alfian Abdul Halin</na></co>
<co c="0"><na f="j/Jiang:Yuanyuan" pid="68/9608">Yuanyuan Jiang</na></co>
<co c="0"><na f="k/Kedziora:Michal" pid="97/10224">Michal Kedziora</na></co>
<co c="0"><na f="k/Khajehali:Naghmeh" pid="210/7237">Naghmeh Khajehali</na></co>
<co c="0"><na f="k/Kim:Intae" pid="41/3805">Intae Kim</na></co>
<co c="0"><na f="k/Kim:Jongkil" pid="140/2998">Jongkil Kim</na></co>
<co c="0"><na f="l/Le:John" pid="48/10919">John Le</na></co>
<co c="0"><na f="l/Le:Ngoc=Thuy" pid="193/0348">Ngoc-Thuy Le</na></co>
<co c="0"><na f="l/Li:Jing" pid="181/2820">Jing Li</na></co>
<co c="0"><na f="l/Li_0007:Nan" pid="84/3795-7">Nan Li 0007</na></co>
<co c="0"><na f="l/Li_0001:Wanqing" pid="57/3330">Wanqing Li 0001</na></co>
<co c="0"><na f="l/Li_0001:Yannan" pid="136/0901">Yannan Li 0001</na></co>
<co c="0"><na f="l/Liu:Dongxi" pid="18/477">Dongxi Liu</na></co>
<co c="0"><na f="l/Liu:Song" pid="80/1141">Song Liu</na></co>
<co c="0"><na f="m/Mu_0001:Yi" pid="m/YiMu">Yi Mu 0001</na></co>
<co c="0"><na f="m/Mukherjee:Madhav" pid="312/4224">Madhav Mukherjee</na></co>
<co c="0"><na f="n/Nguyen:Chau" pid="54/2608">Chau Nguyen</na></co>
<co c="0"><na f="n/Nguyen:Duy_Tung_Khanh" pid="364/1194">Duy Tung Khanh Nguyen</na></co>
<co c="0"><na f="n/Nguyen:Vu_Duc" pid="70/10592">Vu Duc Nguyen</na></co>
<co c="1" n="2"><na f="n/Norowi:Noris_Mohd=" pid="19/3131">Noris Mohd. Norowi</na><na>Noris Mohd Norowi</na></co>
<co c="0"><na f="o/Ogeil:Rowan_P=" pid="132/6095">Rowan P. Ogeil</na></co>
<co c="0"><na f="o/Ogunbona:Philip" pid="09/325">Philip Ogunbona</na></co>
<co c="0"><na f="p/Phillips:James_G=" pid="73/651">James G. Phillips</na></co>
<co c="0"><na f="p/Phuong:Tran_Viet_Xuan" pid="148/1452">Tran Viet Xuan Phuong</na></co>
<co c="0"><na f="p/Pose:Ronald" pid="64/4616">Ronald Pose</na></co>
<co c="0"><na f="p/Pranata:Ilung" pid="98/10307">Ilung Pranata</na></co>
<co c="0"><na f="r/Rana:Santu" pid="57/6712">Santu Rana</na></co>
<co c="1"><na f="r/Razali:Md_Saifullah" pid="292/5968">Md Saifullah Razali</na></co>
<co c="0"><na f="r/Regan:Matthew" pid="34/1048">Matthew Regan</na></co>
<co c="0"><na f="r/Rogers:Heather" pid="394/4776">Heather Rogers</na></co>
<co c="0"><na f="s/Sargeant:James" pid="155/9589">James Sargeant</na></co>
<co c="0"><na f="s/Shoaib:Faizan" pid="352/0968">Faizan Shoaib</na></co>
<co c="0"><na f="s/Shojaei:Parisasadat" pid="369/7735">Parisasadat Shojaei</na></co>
<co c="0"><na f="s/Su:Wenjing" pid="84/8730">Wenjing Su</na></co>
<co c="0"><na f="s/Susilo:Willy" pid="12/3447">Willy Susilo</na></co>
<co c="0" n="2"><na f="t/Ta:The=Anh" pid="330/1728">The-Anh Ta</na><na>The Anh Ta</na></co>
<co c="0"><na f="t/Thorncharoensri:Pairat" pid="73/3923">Pairat Thorncharoensri</na></co>
<co c="0"><na f="t/Tonien:Joseph" pid="182/6184">Joseph Tonien</na></co>
<co c="0"><na f="t/Troiani:Christian" pid="424/3856">Christian Troiani</na></co>
<co c="0"><na f="v/Venkatesh:Svetha" pid="81/1984">Svetha Venkatesh</na></co>
<co c="0"><na f="v/Vlahu=Gjorgievska:Elena" pid="19/10042">Elena Vlahu-Gjorgievska</na></co>
<co c="0"><na f="w/Wang_0001:Cong" pid="18/2771-1">Cong Wang 0001</na></co>
<co c="0"><na f="w/Wang_0001:Jianfeng" pid="65/4872-1">Jianfeng Wang 0001</na></co>
<co c="0"><na f="w/Wiangsripanawan:Rungrat" pid="26/2117">Rungrat Wiangsripanawan</na></co>
<co c="0"><na f="w/Wong:Duncan_S=" pid="85/5606">Duncan S. Wong</na></co>
<co c="0"><na f="x/Xu:Zhangyi" pid="384/5393">Zhangyi Xu</na></co>
<co c="0"><na f="y/Yan_0005:Jun" pid="89/5901-5">Jun Yan 0005</na></co>
<co c="0"><na f="y/Yang:Guomin" pid="78/2235">Guomin Yang</na></co>
<co c="0"><na f="y/Yu:Jianke" pid="316/0485">Jianke Yu</na></co>
<co c="0"><na f="y/Yu:Yiding" pid="211/7215">Yiding Yu</na></co>
<co c="0"><na f="z/Zhang_0001:Ying" pid="13/6769-1">Ying Zhang 0001</na></co>
<co c="0"><na f="z/Zhou:Hua=Yu" pid="17/8816">Hua-Yu Zhou</na></co>
<co c="2" n="2"><na f="z/Zhou:Zhiquan" pid="77/5181">Zhiquan Zhou</na><na>Zhi Quan Zhou</na></co>
<co c="0"><na f="z/Zong:Wei" pid="145/0551">Wei Zong</na></co>
</coauthors>
</dblpperson>

