关注
Kwok-Yan Lam
标题
引用次数
年份
(Computer Standards and Interfaces, 27 (4): 407-413) A Novel ID-based Multisignature Scheme without Reblocking and Predetermined Signing Order
CC Chang, IC Lin, KY Lam
USA: Elsevier BV, 2005
2005
3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks
H Yang, KY Lam, J Nie, J Zhao, S Garg, L Xiao, Z Xiong, M Guizani
2021 IEEE Globecom Workshops (GC Wkshps), 1-6, 2021
52021
A blockchain framework for insurance processes
M Raikwar, S Mazumdar, S Ruj, SS Gupta, A Chattopadhyay, KY Lam
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
2332018
A blockchain-based approach for saving and tracking differential-privacy cost
Y Zhao, J Zhao, J Kang, Z Zhang, D Niyato, S Shi, KY Lam
IEEE Internet of Things Journal 8 (11), 8865-8882, 2021
302021
A cardinalised binary representation for exponentiation
KY Lam, K Sung, LCK Hui
Computers & Mathematics with Applications 30 (8), 33-39, 1995
21995
A class of explicit perfect multi-sequences
C Xing, KY Lam, Z Wei
International Conference on the Theory and Application of Cryptology and …, 1999
121999
A Comparative Study of Transactional and Semantic Approaches for Predicting Cascades on Twitter.
Y Zhao, C Wang, CH Chi, KY Lam, S Wang
IJCAI, 1212-1218, 2018
82018
A Comprehensive Survey of 6G Wireless Communications
Y Zhao, W Zhai, J Zhao, T Zhang, S Sun, D Niyato, KY Lam
arXiv preprint arXiv:2101.03889, 2020
552020
A data reduction method for intrusion detection
KY Lam, L Hui, SL Chung
Journal of Systems and Software 33 (1), 101-108, 1996
261996
A fast algorithm for determining the linear complexity of a sequence with period p/sup n/over GF (q)
G Xiao, S Wei, KY Lam, K Imamura
IEEE Transactions on Information Theory 46 (6), 2203-2206, 2000
912000
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions
H Chen, H Sun, KY Lam
The International Conference on Emerging Security Information, Systems, and …, 2007
92007
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions, Intl. Conf. on Emerging Security Information, Systems and Technologies
H Chen, H Sun, KY Lam
IEEE, Oct, 14-20, 2007
2007
A Generalization of Algebraic Geometry Codes fJ1
C Xing, H Niederriter, KY Lam
IEEE transations on information theory 7, 1, 1999
21999
A generalization of algebraic-geometry codes
C Xing, H Niederreiter, KY Lam
IEEE Transactions on Information Theory 45 (7), 2498-2501, 1999
681999
A hybrid framework of reinforcement learning and convex optimization for uav-based autonomous metaverse data collection
P Si, L Qian, J Zhao, KY Lam
IEEE Network 37 (4), 248-254, 2023
32023
A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles
J Fan, M Xu, Z Liu, H Ye, C Gu, D Niyato, KY Lam
2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), 1-5, 2023
12023
A Light Weight Non-Repudiation Protocol
CH YOU, KY LAM
電子情報通信学会技術研究報告. ISEC, 情報セキュリティ 98 (464), 25-34, 1998
1998
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms
CH Chi, KY Lam
AWCC, 2004
2004
A method for obtaining cryptographically strong 8/spl times/8 S-boxes
X Yi, SX Cheng, XH You, KY Lam
GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record 2 …, 1997
931997
A Multi-task Learning Approach for Predicting Intentions Using Smart Home IoT Services
B Huang, B Zhang, QZ Sheng, KY Lam
International Conference on Service-Oriented Computing, 413-421, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20