Siu‐Ming Yiu

Follow

Generating author description...

All published works
Action Title Year Authors
+ PDF Chat Efficient Traffic Prediction Through Spatio-Temporal Distillation 2025 Qianru Zhang
Xinyi Gao
Haixin Wang
Siu‐Ming Yiu
Hongzhi Yin
+ PDF Chat Generalizable Single-view Object Pose Estimation by Two-side Generating and Matching 2024 Yujing Sun
Caiyi Sun
Yuan Liu
Yuexin Ma
Siu‐Ming Yiu
+ PDF Chat Graph Masked Autoencoder for Spatio-Temporal Graph Learning 2024 Qianru Zhang
Haixin Wang
Siu‐Ming Yiu
Hongzhi Yin
+ PDF Chat Cyber-Physical Authentication Scheme for Secure V2G Transactions Using Blockchain and Smart Contracts 2024 Yunwang Chen
Yanmin Zhao
Siu‐Ming Yiu
+ PDF Chat Billiards Sports Analytics: Datasets and Tasks 2024 Qianru Zhang
Zheng Wang
Cheng Long
Siu‐Ming Yiu
+ PDF Chat A Survey of Generative Techniques for Spatial-Temporal Data Mining 2024 Qianru Zhang
Haixin Wang
Long Cheng
Liangcai Su
Xingwei He
Jianlong Chang
Tailin Wu
Hongzhi Yin
Siu‐Ming Yiu
Qi Tian
+ PDF Chat State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems 2024 Junbin Fang
You Jiang
Canjian Jiang
Zoe L. Jiang
Chuanyi Liu
Siu‐Ming Yiu
+ PDF Chat GPFL: A Gradient Projection-Based Client Selection Framework for Efficient Federated Learning 2024 Shijie Na
Yuzhi Liang
Siu‐Ming Yiu
+ PDF Chat Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation 2024 Junbin Fang
Canjian Jiang
You Jiang
Puxi Lin
Zhaojie Chen
Yujing Sun
Siu‐Ming Yiu
Zoe L. Jiang
+ PDF Chat Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning 2023 Qianru Zhang
Zheng Wang
Cheng Long
Chao Huang
Siu‐Ming Yiu
Yiding Liu
Gao Cong
J. Y. Shi
+ State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems 2023 Junbin Fang
You Jiang
Canjian Jiang
Zoe L. Jiang
Siu‐Ming Yiu
Chuanyi Liu
+ Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation 2023 Junbin Fang
Canjian Jiang
You Jiang
Puxi Lin
Zhaojie Chen
Yujing Sun
Siu‐Ming Yiu
Zoe L. Jiang
+ Privacy-Preserving Distributed Machine Learning Made Faster 2022 Zoe L. Jiang
Jiajing Gu
Hongxiao Wang
Yulin Wu
Junbin Fang
Siu‐Ming Yiu
Wenjian Luo
Xuan Wang
+ Online Anomalous Subtrajectory Detection on Road Networks with Deep Reinforcement Learning 2022 Qianru Zhang
Zheng Wang
Long Cheng
Chao Huang
Siu‐Ming Yiu
Yiding Liu
Gao Cong
J. Y. Shi
+ Securer and Faster Privacy-Preserving Distributed Machine Learning 2022 Hongxiao Wang
Zoe L. Jiang
Yanmin Zhao
Siu‐Ming Yiu
Peng Yang
Zejiu Tan
Bohan Jin
XU Shi-yuan
Shimin Pan
+ Optimal Procurement Auction for Cooperative Production of Virtual Products: Vickrey-Clarke-Groves Meet Cremer-McLean 2020 Mingshu Cong
Xi Weng
Han Yu
Jiabao Qu
Siu‐Ming Yiu
+ Decentralized Search on Decentralized Web 2018 Ziliang Lai
Chris Liu
Eric Lo
Ben Kao
Siu‐Ming Yiu
+ PDF Chat SOAP3-dp: Fast, Accurate and Sensitive GPU-Based Short Read Aligner 2013 Ruibang Luo
Thomas K. F. Wong
Jian-Qiao Zhu
Chi-Man Liu
Xiaoqian Zhu
Edward Wu
Lap-Kei Lee
Haoxiang Lin
Wenjuan Zhu
David W. Cheung
+ Identity Based Threshold Ring Signature 2005 Sherman S. M. Chow
Lucas C. K. Hui
Siu‐Ming Yiu
+ Non-shared edges and nearest neighbor interchanges revisited 2004 Wing-Kai Hon
Ming‐Yang Kao
Tak‐Wah Lam
Wing‐Kin Sung
Siu‐Ming Yiu
+ Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor Interchanges, and Subtree Transfers 2002 Wing-Kai Hon
Ming‐Yang Kao
Tak‐Wah Lam
Wing‐Kin Sung
Siu‐Ming Yiu
+ PDF Chat Predicting RNA secondary structures with arbitrary pseudoknots by maximizing the number of stacking pairs 2001 Samuel Ieong
Ming‐Yang Kao
Tak‐Wah Lam
Wing‐Kin Sung
Siu‐Ming Yiu
+ Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs 2001 Samuel Ieong
Ming‐Yang Kao
Tak‐Wah Lam
Wing‐Kin Sung
Siu‐Ming Yiu
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ Comparison of labeled trees with valency three 1971 D. F. Robinson
2
+ Separable Linkable Threshold Ring Signatures 2004 Patrick P. Tsang
Victor K. Wei
Kai Fung Chan
Man Ho Au
Joseph K. Liu
Duncan S. Wong
1
+ Threshold Ring Signatures and Applications to Ad-hoc Groups 2002 Emmanuel Bresson
Jacques Stern
Michael Szydlo
1
+ Folding@Home and Genome@Home: Using distributed computing to tackle previously intractable problems in computational biology 2009 Stefan Larson
Michael R. Shirts
Vijay S. Pande
Christopher D. Snow
1
+ A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. 2004 Victor K. Wei
1
+ PDF Chat A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme 2003 Chong Gao
Zheng‐an Yao
Lei Li
1
+ Explaining and Harnessing Adversarial Examples 2014 Ian Goodfellow
Jonathon Shlens
Christian Szegedy
1
+ Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups 2005 Kai Fung Chan
Karyin Fung
Joseph K. Liu
Victor K. Wei
1
+ Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2 2004 YoungJu Choie
Eunjeong Lee
1
+ Temporal Outlier Detection in Vehicle Traffic Data 2009 Xiaolei Li
Zhenhui Li
Jiawei Han
Jae-Gil Lee
1
+ How to Leak a Secret 2001 Ronald L. Rivest
Adi Shamir
Yael Tauman
1
+ Faster and More Accurate Sequence Alignment with SNAP 2011 Matei Zaharia
William J. Bolosky
Kristal Curtis
A. Nicole Fox
David A. Patterson
Scott Shenker
Ion Stoica
Richard M. Karp
Taylor Sittler
1
+ PDF Chat Quantifying Search Bias: Investigating Sources of Bias for Political Searches in Social Media 2017 Juhi Kulshrestha
Motahhare Eslami
Johnnatan Messias
Muhammad Bilal Zafar
Saptarshi Ghosh
Krishna P. Gummadi
Karrie Karahalios
1
+ Invisible Mask: Practical Attacks on Face Recognition with Infrared 2018 Zhe Zhou
Di Tang
XiaoFeng Wang
Weili Han
Xiangyu Liu
Kehuan Zhang
1
+ PDF Chat Adversarial Examples: Opportunities and Challenges 2019 Jiliang Zhang
Chen Li
1
+ Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers 2018 Nicole Nichols
Robert Jasper
1
+ Group signatures 1991 David Chaum
Eugène van Heyst
1
+ Competitive Statistical Estimation with Strategic Data Sources 2019 Tyler Westenbroek
Roy Dong
Lillian J. Ratliff
S. Shankar Sastry
1
+ Interpret Federated Learning with Shapley Values. 2019 Guan Wang
1
+ PDF Chat Sequential Anomaly Detection using Inverse Reinforcement Learning 2019 Min-hwan Oh
Garud Iyengar
1
+ Towards Efficient Data Valuation Based on the Shapley Value 2019 Ruoxi Jia
David Dao
Boxin Wang
Frances Ann Hubis
Nick Hynes
Nezihe Merve Gürel
Bo Li
Ce Zhang
Dawn Song
Costas J. Spanos
1
+ Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey 2018 Naveed Akhtar
Ajmal Mian
1
+ PDF Chat End-To-End Interpretable Neural Motion Planner 2019 Wenyuan Zeng
Wenjie Luo
Simon Su
Abbas Sadat
Bin Yang
Sergio Casas
Raquel Urtasun
1
+ Rewarding High-Quality Data via Influence Functions 2019 Adam Richardson
Aris Filos-Ratsikas
Boi Faltings
1
+ PDF Chat Universal Physical Camouflage Attacks on Object Detectors 2020 Lifeng Huang
Chengying Gao
Yuyin Zhou
Cihang Xie
Alan Yuille
Changqing Zou
Ning Liu
1
+ PDF Chat Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study 2020 Dinh-Luan Nguyen
Sunpreet S. Arora
Yuhang Wu
Hao Yang
1
+ SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations 2020 Giulio Lovisotto
Henry Turner
Ivo Sluganovic
Martin Strohmeier
Ivan Martinović
1
+ PDF Chat Efficient and effective similar subtrajectory search with deep reinforcement learning 2020 Zheng Wang
Cheng Long
Gao Cong
Yiding Liu
1
+ PDF Chat Cooperative Games with Overlapping Coalitions 2010 Georgios Chalkiadakis
Edith Elkind
Evangelos Markakis
Maria Polukarov
Nicholas R. Jennings
1
+ PDF Chat One Pixel Attack for Fooling Deep Neural Networks 2019 Jiawei Su
Danilo Vargas
Kouichi Sakurai
1
+ PDF Chat Graph Convolutional Networks for Road Networks 2019 Tobias Skovgaard Jepsen
Christian S. Jensen
Thomas D. Nielsen
1
+ PDF Chat Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink 2021 Ranjie Duan
Xiaofeng Mao
A. K. Qin
Yuefeng Chen
Shaokai Ye
Yuan He
Yun Yang
1
+ PDF Chat Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect 2021 Athena Sayles
Ashish Hooda
Mohit Gupta
Rahul Chatterjee
Earlence Fernandes
1
+ PDF Chat The Translucent Patch: A Physical and Universal Attack on Object Detectors 2021 Alon Zolfi
Moshe Kravchik
Yuval Elovici
Asaf Shabtai
1
+ PDF Chat Adversarial Imaging Pipelines 2021 Buu Phan
Fahim Mannan
Felix Heide
1
+ PDF Chat Fooling Thermal Infrared Pedestrian Detectors in Real World Using Small Bulbs 2021 Xiaopei Zhu
Xiao Li
Jianmin Li
Zheyao Wang
Xiaolin Hu
1
+ PDF Chat Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks 2021 Roi Pony
Itay Naeh
Shie Mannor
1
+ Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition 2021 Bangjie Yin
Wenxuan Wang
Taiping Yao
Junfeng Guo
Zelun Kong
Shouhong Ding
Jilin Li
Cong Liu
1
+ PDF Chat Optical Adversarial Attack 2021 Abhiram Gnanasambandam
Alex Sherman
Stanley H. Chan
1
+ Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey 2021 Naveed Akhtar
Ajmal Mian
Navid Kardan
Mubarak Shah
1
+ PDF Chat They See Me Rollin’: Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors 2021 Sebastian Köhler
Giulio Lovisotto
Simon Birnbach
Richard Baker
Ivan Martinović
1
+ Group Signatures 1991 David Chaum
Eugène van Heyst
1
+ PDF Chat Adversarial Texture for Fooling Person Detectors in the Physical World 2022 Zhanhao Hu
Siyuan Huang
Xiaopei Zhu
Fuchun Sun
Bo Zhang
Xiaolin Hu
1
+ PDF Chat Adversarial Sticker: A Stealthy Attack Method in the Physical World 2022 Xingxing Wei
Ying Guo
Jie Yu
1
+ Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs 2022 Chengyin Hu
Weiwen Shi
1
+ Coupled IGMM-GANs for deep multimodal anomaly detection in human mobility data 2018 Kathryn Gray
Daniel Smolyak
Sarkhan Badirli
George Mohler
1
+ Intriguing Properties of Adversarial Examples 2017 Ekin D. Cubuk
Barret Zoph
Samuel S. Schoenholz
Quoc V. Le
1
+ Physical Adversarial Attack meets Computer Vision: A Decade Survey 2022 Hui Wei
Hao Tang
Xuemei Jia
Hanxun Yu
Zhubo Li
Zhixiang Wang
Shin’ichi Satoh
Zheng Wang
1
+ PDF Chat Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon 2022 Yiqi Zhong
Xianming Liu
Deming Zhai
Junjun Jiang
Xiangyang Ji
1
+ PDF Chat Physical-World Optical Adversarial Attacks on 3D Face Recognition 2023 Yanjie Li
Yiquan Li
Xuelong Dai
Songtao Guo
Bin Xiao
1