Theo dơi
Wanli Ma
Wanli Ma
Email được xác minh tại canberra.edu.au
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
An overview of temporal and modal logic programming
MA Orgun, W Ma
International Conference on Temporal Logic, 445-479, 1994
1861994
Password entropy and password quality
W Ma, J Campbell, D Tran, D Kleeman
2010 fourth international conference on network and system security, 583-587, 2010
1272010
Using Shannon Entropy as EEG Signal Feature for Fast Person Identification.
DQ Phung, D Tran, W Ma, P Nguyen, T Pham
ESANN 4 (1), 413-418, 2014
992014
Senior health monitoring using Kinect
M Parajuli, D Tran, W Ma, D Sharma
2012 Fourth International Conference on Communications and Electronics (ICCE …, 2012
882012
Multi-factor EEG-based user authentication
T Pham, W Ma, D Tran, P Nguyen, D Phung
2014 International Joint Conference on Neural Networks (IJCNN), 4029-4034, 2014
672014
Impact of restrictive composition policy on user password choices
J Campbell, W Ma, D Kleeman
Behaviour & Information Technology 30 (3), 379-388, 2011
672011
Age and gender classification using EEG paralinguistic features
P Nguyen, D Tran, X Huang, W Ma
2013 6th International IEEE/EMBS Conference on Neural Engineering (NER …, 2013
502013
A novel spam email detection system based on negative selection
W Ma, D Tran, D Sharma
2009 Fourth International Conference on Computer Sciences and Convergence …, 2009
462009
The good and not so good of enforcing password composition rules
J Campbell, D Kleeman, W Ma
Information Systems Security 16 (1), 2-8, 2007
432007
An optimal sphere and two large margins approach for novelty detection
T Le, D Tran, W Ma, D Sharma
The 2010 international joint conference on neural networks (IJCNN), 1-6, 2010
372010
EEG-based user authentication in multilevel security systems
T Pham, W Ma, D Tran, P Nguyen, D Phung
Advanced Data Mining and Applications: 9th International Conference, ADMA …, 2013
352013
Negative selection with antigen feedback in intrusion detection
W Ma, D Tran, D Sharma
Artificial Immune Systems: 7th International Conference, ICARIS 2008, Phuket …, 2008
322008
A study on the feasibility of using EEG signals for authentication purpose
T Pham, W Ma, D Tran, P Nguyen, D Phung
Neural Information Processing: 20th International Conference, ICONIP 2013 …, 2013
312013
A conceptual framework for assessing password quality
W Ma, J Campbell, D Tran, D Kleeman
International Journal of Computer Science and Network Security 7 (1), 179-185, 2007
312007
A study on the stability of EEG signals for user authentication
T Pham, W Ma, D Tran, DS Tran, D Phung
2015 7th international IEEE/EMBS conference on neural engineering (NER), 122-125, 2015
302015
A comprehensive survey of the feature extraction methods in the EEG research
MA Rahman, W Ma, D Tran, J Campbell
Algorithms and Architectures for Parallel Processing: 12th International …, 2012
302012
Investigating the possibility of applying EEG lossy compression to EEG-based user authentication
B Nguyen, D Nguyen, W Ma, D Tran
2017 international joint conference on neural networks (IJCNN), 79-85, 2017
292017
On the study of EEG-based cryptographic key generation
D Nguyen, D Tran, D Sharma, W Ma
Procedia computer science 112, 936-945, 2017
292017
Multiple distribution data description learning method for novelty detection
T Le, D Tran, P Nguyen, W Ma, D Sharma
The 2011 International Joint Conference on Neural Networks, 2321-2326, 2011
29*2011
A security architecture for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
292008
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hăy thử lại sau.
Bài viết 1–20