Follow
Wei-Chuen Yau
Wei-Chuen Yau
Xiamen University Malaysia
Verified email at xmu.edu.my
Title
Cited by
Cited by
Year
OFF-ApexNet on micro-expression recognition system
YS Gan, ST Liong, WC Yau, YC Huang, LK Tan
Signal Processing: Image Communication 74, 129-139, 2019
2512019
Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems
WC Yau, RCW Phan
Journal of medical systems 37, 1-9, 2013
2142013
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
Autonomic and Trusted Computing: 5th International Conference, ATC 2008 …, 2008
1782008
Searchable symmetric encryption: Designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
1612017
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
902008
Integrated churn prediction and customer segmentation framework for telco business
S Wu, WC Yau, TS Ong, SC Chong
Ieee Access 9, 62118-62136, 2021
862021
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
782013
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
WS Yap, RCW Phan, WC Yau, SH Heng
Nonlinear Dynamics 80 (3), 1483-1491, 2015
772015
Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage
L Guo, WC Yau
Journal of medical systems 39, 1-11, 2015
712015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
662015
Proxy re-encryption with keyword search: New definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity …, 2010
582010
Design and Implementation of an XML Firewall
YS Loh, WC Yau, CT Wong, WC Ho
2006 International Conference on Computational Intelligence and Security 2 …, 2006
542006
TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain
L Guo, X Yang, WC Yau
IEEE Access 9, 8479-8490, 2021
512021
Integrated neural network and machine vision approach for leather defect classification
ST Liong, YS Gan, YC Huang, KH Liu, WC Yau
arXiv preprint arXiv:1905.11731, 2019
312019
A decryptable attribute-based keyword search scheme on eHealth cloud in Internet of Things platforms
L Guo, Z Li, WC Yau, SY Tan
IEEE Access 8, 26107-26118, 2020
262020
On the effective subkey space of some image encryption algorithms using external key
WS Yap, RCW Phan, BM Goi, WC Yau, SH Heng
Journal of Visual Communication and Image Representation 40, 51-57, 2016
252016
Automated leather defect inspection using statistical approach on image intensity
YS Gan, SS Chee, YC Huang, ST Liong, WC Yau
Journal of Ambient Intelligence and Humanized Computing 12 (10), 9269-9285, 2021
242021
Random differential fault attacks on the lightweight authenticated encryption stream cipher grain-128AEAD
I Salam, TH Ooi, L Xue, WC Yau, J Pieprzyk, RCW Phan
IEEE Access 9, 72568-72586, 2021
192021
Cube attacks on round-reduced TinyJAMBU
WL Teng, I Salam, WC Yau, J Pieprzyk, RCW Phan
Scientific Reports 12 (1), 5317, 2022
182022
Learning age from gait: A survey
TB Aderinola, T Connie, TS Ong, WC Yau, ABJ Teoh
IEEE Access 9, 100352-100368, 2021
182021
The system can't perform the operation now. Try again later.
Articles 1–20