Follow
Vrizlynn Thing
Vrizlynn Thing
Unknown affiliation
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Securing android: a survey, taxonomy, and challenges
DJJ Tan, TW Chua, VLL Thing
ACM Computing Surveys (CSUR) 47 (4), 58, 2015
206*2015
Autonomous Vehicle Security: A Taxonomy of Attacks and Defences
VLL Thing, J Wu
Internet of Things (iThings) and IEEE Green Computing and Communications …, 2016
2032016
Twenty years of digital audio watermarking—a comprehensive review
G Hua, J Huang, YQ Shi, J Goh, VLL Thing
Signal Processing 128, 222-242, 2016
1972016
IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach
VLL Thing
Wireless Communications and Networking Conference (WCNC), 2017 IEEE, 1-6, 2017
1882017
Image Region Forgery Detection: A Deep Learning Approach
Y Zhang, LL Win, J Goh, VLL Thing
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber …, 2016
1882016
Port hopping for resilient networks
HCJ Lee, VLL Thing
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3291-3295, 2004
1612004
Live memory forensics of mobile phones
VLL Thing, KY Ng, EC Chang
digital investigation 7, S74-S82, 2010
1602010
A survey on image tampering and its detection in real-world photos
L Zheng, Y Zhang, VLL Thing
Journal of Visual Communication and Image Representation 58, 380-399, 2019
1572019
Automated face swapping and its detection
Y Zhang, L Zheng, VLL Thing
Signal and Image Processing (ICSIP), 2017 IEEE 2nd International Conference …, 2017
1362017
ICMP traceback with cumulative path, an efficient solution for IP traceback
HCJ Lee, VLL Thing, Y Xu, M Ma
International Conference on Information and Communications Security, 124-135, 2003
1002003
Biff: A blockchain-based iot forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE Region 10 Conference, 2372-2377, 2018
872018
Fingerprint liveness detection from single image using low-level features and shape analysis
RK Dubey, J Goh, VLL Thing
IEEE Transactions on Information Forensics and Security 11 (7), 1461-1475, 2016
842016
Time-spread echo-based audio watermarking with optimized imperceptibility and robustness
G Hua, J Goh, VLL Thing
IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP) 23 (2 …, 2015
772015
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
International Conference on Advanced Data Mining and Applications, 727-740, 2017
762017
A survey of bots used for distributed denial of service attacks
VL Thing, M Sloman, N Dulay
IFIP International Information Security Conference, 229-240, 2007
762007
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic
I Nevat, DM Divakaran, SG Nagarajan, P Zhang, L Su, LL Ko, VLL Thing
IEEE/ACM Transactions on Networking (TON) 26 (1), 131-144, 2018
692018
Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment
BS Lim, SL Keoh, VLL Thing
602018
Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study
Z Wang, KW Fok, VLL Thing
Computers & Security, 102542, 2021
592021
A scalable and extensible framework for android malware detection and family attribution
L Zhang, VLL Thing, Y Cheng
Computers & Security 80, 120-133, 2019
592019
Audio Authentication by Exploring the Absolute-Error-Map of ENF Signals
G Hua, Y Zhang, J Goh, VLL Thing
IEEE Transactions on Information Forensics and Security 11 (5), 1003-1016, 2016
592016
The system can't perform the operation now. Try again later.
Articles 1–20