default search action
Wun-She Yap
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Ming Ping Yong, Yan Chai Hum, Khin Wee Lai, Ying Loong Lee, Choon-Hian Goh, Wun-She Yap, Yee-Kai Tee:
Histopathological Cancer Detection Using Intra-Domain Transfer Learning and Ensemble Learning. IEEE Access 12: 1434-1457 (2024) - [j43]Jiajia Lu, Wun-She Yap, Kok-Chin Khor:
PointADAM: Unsupervised Adversarial Domain Adaptation on Point Clouds With Metric Learning via Compact Feature Representation. IEEE Access 12: 77486-77500 (2024) - [j42]Jia-Lin Chan, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Boon-Yaik Ooi, Bok-Min Goi:
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform. Clust. Comput. 27(8): 11213-11235 (2024) - [j41]Wingates Voon, Yan Chai Hum, Yee-Kai Tee, Wun-She Yap, Khin Wee Lai, Humaira Nisar, Hamam Mokayed:
IMAML-IDCG: Optimization-based meta-learning with ImageNet feature reusing for few-shot invasive ductal carcinoma grading. Expert Syst. Appl. 257: 124969 (2024) - [j40]Kuan-Wai Wong, Wun-She Yap, Bok-Min Goi, Denis Chee-Keong Wong, Guodong Ye:
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map. J. Inf. Secur. Appl. 81: 103692 (2024) - [j39]Wong Yoke Kim, Yan Chai Hum, Yee-Kai Tee, Wun-She Yap, Hamam Mokayed, Khin Wee Lai:
A modified single image dehazing method for autonomous driving vision system. Multim. Tools Appl. 83(9): 25867-25899 (2024) - [j38]Ying-Jih Ding, Wun-She Yap, Kok-Chin Khor:
Profiling and Identifying Smurfs or Boosters on Dota 2 Using K-Means and IQR. IEEE Trans. Games 16(3): 577-585 (2024) - [c29]Qi Ke, Rong Gao, Wun-She Yap, Yee-Kai Tee, Yan Chai Hum, Yujian Gan:
Malaria Cell Images Classification with Deep Ensemble Learning. ICIC (LNBI 1) 2024: 417-427 - [c28]Jia-Lin Chan, Wun-She Yap, Denis Chee-Keong Wong, Bok-Min Goi, Wai-Kong Lee:
Privacy-Preserving Detection of Helmet and Mask Wearing with Fully Homomorphic Encryption: Towards a Secure Inference Approach. RTSI 2024: 554-559 - 2023
- [j37]Xiaoling Huang, Youxia Dong, Guodong Ye, Wun-She Yap, Bok-Min Goi:
Visually meaningful image encryption algorithm based on digital signature. Digit. Commun. Networks 9(1): 159-165 (2023) - [j36]Sheikh Abdul Hameed Ayubkhan, Wun-She Yap, Ezra Morris, Mumtaj Begam Kasim Rawthar:
A practical intrusion detection system based on denoising autoencoder and LightGBM classifier with improved detection performance. J. Ambient Intell. Humaniz. Comput. 14(6): 7427-7452 (2023) - [j35]Zheng-Yan Wong, Denis Chee-Keong Wong, Wai-Kong Lee, Kai Ming Mok, Wun-She Yap, Ayesha Khalid:
KaratSaber: New Speed Records for Saber Polynomial Multiplication Using Efficient Karatsuba FPGA Architecture. IEEE Trans. Computers 72(7): 1830-1842 (2023) - [j34]Yen-Lung Lai, Xingbo Dong, Zhe Jin, Massimo Tistarelli, Wun-She Yap, Bok-Min Goi:
Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography. IEEE Trans. Inf. Forensics Secur. 18: 3101-3115 (2023) - [c27]Jia-Lin Chan, Bok-Min Goi, Wun-She Yap, Wai-Kong Lee, Seong Oun Hwang:
Efficient Implementation of ACORN and AEGIS-128 Authenticated Encryption on GPU for Internet of Things. ICCT 2023: 1275-1279 - 2022
- [j33]Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap:
New differential cryptanalysis results for the lightweight block cipher BORON. J. Inf. Secur. Appl. 66: 103129 (2022) - [j32]Shi-Ting Wong, Chian Wen Too, Wun-She Yap, Kok-Chin Khor:
Medical equipment recognition using deep transfer learning. J. Intell. Fuzzy Syst. 43(1): 1001-1010 (2022) - [j31]Yan Chai Hum, Hou Ren Tan, Yee-Kai Tee, Wun-She Yap, Tian Swee Tan, Maheza Irna Mohamad Salim, Khin Wee Lai:
The development of skin lesion detection application in smart handheld devices using deep neural networks. Multim. Tools Appl. 81(29): 41579-41610 (2022) - [j30]Kai Liu, Jingjing Cao, Yimin Yang, Wun-She Yap, Rui Tan, Zenghui Wang:
Special issue on neural computing and applications 2021. Neural Comput. Appl. 34(19): 16169-16171 (2022) - [j29]Yan Chai Hum, Yee-Kai Tee, Wun-She Yap, Hamam Mokayed, Tian Swee Tan, Maheza Irna Mohamad Salim, Khin Wee Lai:
A contrast enhancement framework under uncontrolled environments based on just noticeable difference. Signal Process. Image Commun. 103: 116657 (2022) - [c26]Jia Chun Koo, Yan Chai Hum, Khin Wee Lai, Wun-She Yap, Swaminathan Manickam, Yee-Kai Tee:
Deep Machine Learning Histopathological Image Analysis for Renal Cancer Detection. ICCAI 2022: 657-663 - [c25]Feng-Wei Lee, Denis Chee-Keong Wong, Bok-Min Goi, Wun-She Yap:
Key Exchange Protocol Based on Permuted Goppa Syndrome Decoding Problem. ICDSP 2022: 6-10 - [c24]Kuan-Wai Wong, Wun-She Yap, Bok-Min Goi, Denis Chee-Keong Wong:
A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2. ICDSP 2022: 140-145 - [c23]Ren-Jun Choong, Wun-She Yap, Yan Chai Hum, Yee-Kai Tee:
A Study on the Effect of Video Resolution on the Quality of Sound Recovered using the Visual Microphone. IVSP 2022: 113-117 - 2021
- [j28]Tong-Yuen Chai, Bok-Min Goi, Wun-She Yap:
Towards Better Performance for Protected Iris Biometric System with Confidence Matrix. Symmetry 13(5): 910 (2021) - [j27]Jia-Zheng Goey, Wai-Kong Lee, Bok-Min Goi, Wun-She Yap:
Accelerating number theoretic transform in GPU platform for fully homomorphic encryption. J. Supercomput. 77(2): 1455-1474 (2021) - [j26]Wai-Kong Lee, Sedat Akleylek, Denis Chee-Keong Wong, Wun-She Yap, Bok-Min Goi, Seong Oun Hwang:
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA. J. Supercomput. 77(4): 3289-3314 (2021) - [c22]Gee-Kok Tong, Keng Hoong Ng, Wun-She Yap, Kok-Chin Khor:
Construction of Optimal Stock Market Portfolios Using Outlier Detection Algorithm. SCDS 2021: 160-173 - [i3]Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap:
New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON. IACR Cryptol. ePrint Arch. 2021: 1640 (2021) - 2020
- [j25]Jun-Hoe Phoon, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Bok-Min Goi, Raphaël C.-W. Phan:
Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism. IEEE Internet Things J. 7(9): 8513-8524 (2020) - [j24]Kuan-Wai Wong, Wun-She Yap, Denis Chee-Keong Wong, Raphael C.-W. Phan, Bok-Min Goi:
Cryptanalysis of genetic algorithm-based encryption scheme. Multim. Tools Appl. 79(35-36): 25259-25276 (2020) - [j23]Jun-Hoe Phoon, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Bok-Min Goi:
Area-Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA. IEEE Trans. Very Large Scale Integr. Syst. 28(12): 2672-2684 (2020)
2010 – 2019
- 2019
- [j22]Hoon-Keng Poon, Wun-She Yap, Yee-Kai Tee, Wai-Kong Lee, Bok-Min Goi:
Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification. Neural Networks 119: 299-312 (2019) - [c21]Lee Sze Foo, Wun-She Yap, Yee-Kai Tee:
Determination of Computationally Efficient Multi-pool Model Fitting Approach for Pulsed Chemical Exchange Saturation Transfer MRI. ICBBS 2019: 32-39 - [c20]Hong-Yi Tan, Wun-She Yap, Bok-Min Goi:
Performance Analysis of an Fuzzy Logic Based LEACH Protocol. ICSCA 2019: 33-37 - [c19]Wai-Kong Lee, Sedat Akleylek, Wun-She Yap, Bok-Min Goi:
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme. ISPEC 2019: 41-55 - 2018
- [j21]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels. IET Commun. 12(10): 1230-1235 (2018) - [j20]Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis. IET Inf. Secur. 12(5): 389-397 (2018) - [j19]Badiul Alam, Zhe Jin, Wun-She Yap, Bok-Min Goi:
An alignment-free cancelable fingerprint template for bio-cryptosystems. J. Netw. Comput. Appl. 115: 20-32 (2018) - [j18]Kong-Yik Chee, Zhe Jin, Danwei Cai, Ming Li, Wun-She Yap, Yen-Lung Lai, Bok-Min Goi:
Cancellable speech template via random binary orthogonal matrices projection hashing. Pattern Recognit. 76: 273-287 (2018) - [c18]S. Y. Lee, Wun-She Yap, Yan Chai Hum, Ban-Hoe Kwan, Bok-Min Goi, Yee-Kai Tee, Zhe Jin:
Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System. ICAIP 2018: 111-115 - [c17]Hoon-Keng Poon, Wun-She Yap, Yee-Kai Tee, Bok-Min Goi, Wai-Kong Lee:
Document level polarity classification with attention gated recurrent unit. ICOIN 2018: 7-12 - [c16]Hon-Sang Cheong, Wun-She Yap, Yee-Kai Tee, Wai-Kong Lee:
Hierarchical Attention Networks for Different Types of Documents with Smaller Size of Datasets. RiTA 2018: 28-41 - [c15]Yat Hong Low, Wun-She Yap, Yee-Kai Tee:
Convolutional Neural Network-Based Collaborative Filtering for Recommendation Systems. RiTA 2018: 117-131 - [c14]Sedat Akleylek, Bok-Min Goi, Wun-She Yap, Denis Chee-Keong Wong, Wai-Kong Lee:
Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1923-1928 - 2017
- [j17]Wun-She Yap, Raphael C.-W. Phan:
Commentary on "A block chaotic image encryption scheme based on self-adaptive modelling" [Applied Soft Computing 22 (2014) 351-357]. Appl. Soft Comput. 52: 501-504 (2017) - [j16]Min Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh, Wun-She Yap:
Data privacy preserving scheme using generalised linear models. Comput. Secur. 69: 142-154 (2017) - [j15]Yen-Lung Lai, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Wun-She Yap, Tong-Yuen Chai, Christian Rathgeb:
Cancellable iris template generation based on Indexing-First-One hashing. Pattern Recognit. 64: 105-117 (2017) - [j14]Zhang Bin Loo, Pohkit Chong, Kim Yee Lee, Wun-She Yap:
Improved Path Loss Simulation Incorporating Three-Dimensional Terrain Model Using Parallel Coprocessors. Wirel. Commun. Mob. Comput. 2017 (2017) - [c13]Kong-Yik Chee, Zhe Jin, Wun-She Yap, Bok-Min Goi:
Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion. APSIPA 2017: 1411-1419 - 2016
- [j13]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - [j12]Wun-She Yap, Bok-Min Goi:
Forgery attacks of an identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 29(2): 283-289 (2016) - [j11]Syh-Yuan Tan, Wun-She Yap:
Cryptanalysis of a CP-ABE scheme with policy in normal forms. Inf. Process. Lett. 116(7): 492-495 (2016) - [j10]Wun-She Yap, Raphael C.-W. Phan, Bok-Min Goi, Wei-Chuen Yau, Swee-Huay Heng:
On the effective subkey space of some image encryption algorithms using external key. J. Vis. Commun. Image Represent. 40: 51-57 (2016) - [j9]Wun-She Yap, Raphael C.-W. Phan, Bok-Min Goi:
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification. Wirel. Pers. Commun. 88(3): 685-699 (2016) - [c12]Min Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh, Wun-She Yap:
Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models. ACISP (1) 2016: 77-93 - [c11]Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap:
Iris Cancellable Template Generation Based on Indexing-First-One Hashing. NSS 2016: 450-463 - 2015
- [j8]Md. Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan, Wun-She Yap:
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum. centric Comput. Inf. Sci. 5: 19 (2015) - [j7]Jian Guo, Chunhua Su, Wun-She Yap:
An improved preimage attack against HAVAL-3. Inf. Process. Lett. 115(2): 386-393 (2015) - [j6]Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan, Bok-Min Goi:
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network. Secur. Commun. Networks 8(17): 3094-3098 (2015) - 2014
- [j5]Jiqiang Lu, Wun-She Yap, Matt Henricksen, Swee-Huay Heng:
Differential attack on nine rounds of the SEED block cipher. Inf. Process. Lett. 114(3): 116-123 (2014) - [j4]Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng, Matt Henricksen:
Security analysis of GCM for communication. Secur. Commun. Networks 7(5): 854-864 (2014) - [j3]Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng, Matt Henricksen:
Parallelizable MAC revisited. Secur. Commun. Networks 7(7): 1115-1127 (2014) - 2013
- [j2]Sze Ling Yeo, Wun-She Yap, Joseph K. Liu, Matt Henricksen:
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions". IEEE Commun. Lett. 17(8): 1521-1523 (2013) - [c10]Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. CT-RSA 2013: 389-404 - 2012
- [i2]Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis. IACR Cryptol. ePrint Arch. 2012: 66 (2012) - 2011
- [c9]Wun-She Yap, Sze Ling Yeo, Chee Hoo Yian:
Cryptanalysis of the full CHAIN cipher. IAS 2011: 40-45 - [c8]Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima:
MASHA - Low Cost Authentication with a New Stream Cipher. ISC 2011: 63-78 - 2010
- [c7]Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka:
Side-Channel Analysis of the K2 Stream Cipher. ACISP 2010: 53-73
2000 – 2009
- 2009
- [j1]Sherman S. M. Chow, Wun-She Yap:
Partial decryption attacks in security-mediated certificateless encryption. IET Inf. Secur. 3(4): 148-151 (2009) - [c6]Leonie Simpson, Matthew Henricksen, Wun-She Yap:
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. ACISP 2009: 108-121 - 2008
- [c5]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
On the Security of an Identity-Based Aggregate Signature Scheme. AINA Workshops 2008: 1523-1528 - 2007
- [c4]Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi:
Security Mediated Certificateless Signatures. ACNS 2007: 459-477 - [c3]Swee-Huay Heng, Wun-She Yap, Khoongming Khoo:
Linkability of Some Blind Signature Schemes. WISTP 2007: 80-89 - [c2]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. WISTP 2007: 115-126 - [i1]Sherman S. M. Chow, Wun-She Yap:
Certificateless Ring Signatures. IACR Cryptol. ePrint Arch. 2007: 236 (2007) - 2006
- [c1]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
An Efficient Certificateless Signature Scheme. EUC Workshops 2006: 322-331
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint