Billy Lau
Billy Lau
Verifierad e-postadress på
Citeras av
Citeras av
Protecting Confidential Data on Personal Computers with Storage Capsules.
K Borders, E Vander Weele, B Lau, A Prakash
USENIX Security Symposium, 367-382, 2009
Mimesis aegis: A mimicry privacy shield–a system’s approach to data privacy on public cloud
B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva
23rd {USENIX} Security Symposium ({USENIX} Security 14), 33-48, 2014
Sensor fusion for public space utilization monitoring in a smart city
BPL Lau, N Wijerathne, BKK Ng, C Yuen
IEEE Internet of Things Journal 5 (2), 473-481, 2017
Mactans: Injecting malware into iOS devices via malicious chargers
B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal
Black Hat USA 92, 2013
A survey of data fusion in smart city applications
BPL Lau, SH Marakkalage, Y Zhou, NU Hassan, C Yuen, M Zhang, ...
Information Fusion 52, 357-374, 2019
On the feasibility of large-scale infections of ios devices
T Wang, Y Jang, Y Chen, S Chung, B Lau, W Lee
23rd {USENIX} Security Symposium ({USENIX} Security 14), 79-93, 2014
Understanding urban human mobility through crowdsensed data
Y Zhou, BPL Lau, C Yuen, B Tunçer, E Wilhelm
IEEE Communications Magazine 56 (11), 52-59, 2018
Extracting point of interest and classifying environment for low sampling crowd sensing smartphone sensor data
BPL Lau, MS Hasala, VS Kadaba, B Thirunavukarasu, C Yuen, B Yuen, ...
2017 IEEE International Conference on Pervasive Computing and Communications …, 2017
A review on dependence graph in social reasoning mechanism
BPL Lau, AK Singh, TPL Tan
Artificial Intelligence Review 43 (2), 229-242, 2015
Understanding the lifestyle of older population: Mobile crowdsensing approach
SH Marakkalage, S Sarica, BPL Lau, SK Viswanath, T Balasubramaniam, ...
IEEE Transactions on Computational Social Systems 6 (1), 82-95, 2018
Spatial and temporal analysis of urban space utilization with renewable wireless sensor network
BPL Lau, T Chaturvedi, BKK Ng, K Li, MS Hasala, C Yuen
2016 IEEE/ACM 3rd International Conference on Big Data Computing …, 2016
Identifying points of interest for elderly in singapore through mobile crowdsensing
SH Marakkalage, BPL Lau, VS Kadaba, T Balasubramaniam, C Yuen, ...
Weighted voting game based algorithm for joining a microscopic coalition
BPL Lau, AK Singh, TPL Tan
2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), 1-4, 2013
Systems and methods of safeguarding user information while interacting with online service providers
W Lee, A Boldyreva, CP Ho, B Lau, C Song
US Patent 9,659,189, 2017
Mimesis aegis: a mimicry privacy shield
B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva
Georgia Institute of Technology, 2014
Direct access to graphics card leveraging VT-d
BH Ng, B Lau, A Parkash
University of Michigan, Tech. Rep, 1-13, 2009
T-DepExp: Simulating transitive dependence based coalition formation
B Lau, A Singh, TPL Tan
Pertanika Journal of Science and Technology 23 (1), 105-117, 2015
Exploiting unpatched ios vulnerabilities for fun and profit
Y Jang, T Wang, B Lee, B Lau
Black Hat USA, 2014
From microstructure to the development of water and major reaction sites inside the catalyst layer of the cathode of a proton exchange membrane fuel cell
MS Lee, TH Chen, WS Lee, BS Lin, BY Lau, PF Tsai, GC Wang
Journal of Power Sources 196 (18), 7411-7419, 2011
Direct Access to Graphics Card Leveraging VT-d Technical Report
BH Ng, B Lau, A Prakash
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20