Search Results - "Chow, Kam Pui"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    COVID-19 Sensing: Negative Sentiment Analysis on Social Media in China via BERT Model by Wang, Tianyi, Lu, Ke, Chow, Kam Pui, Zhu, Qing

    Published in IEEE access (01-01-2020)
    “…Coronavirus disease 2019 (COVID-19) poses massive challenges for the world. Public sentiment analysis during the outbreak provides insightful information in…”
    Get full text
    Journal Article
  2. 2

    An approach to quantifying the plausibility of the inadvertent download defence by Overill, Richard E., Chow, Kam-Pui

    Published in Forensic sciences research (01-01-2016)
    “…A table of 95% confidence limits on the probabilities for randomly downloading relatively small numbers of illegal images or sensitive documents amongst a…”
    Get full text
    Journal Article
  3. 3

    Quantification of digital forensic hypotheses using probability theory by Overill, Richard E., Silomon, Jantje A. M., Kam-Pui Chow, Tse, Hayson

    “…The issue of downloading illegal material from a website onto a personal digital device is considered from the perspective of conventional (Pascalian)…”
    Get full text
    Conference Proceeding
  4. 4
  5. 5
  6. 6

    PLC FORENSICS BASED ON CONTROL PROGRAM LOGIC CHANGE DETECTION WORKS by Yau, Ken, Chow, Kam-Pui

    “…Supervisory Control and Data Acquisition (SCADA) system is an industrial control automated system. It is built with multiple Programmable Logic Controllers…”
    Get full text
    Journal Article
  7. 7
  8. 8

    TAENet: Two-branch Autoencoder Network for Interpretable Deepfake Detection by Du, Fuqiang, Yu, Min, Li, Boquan, Chow, Kam Pui, Jiang, Jianguo, Zhang, Yixin, Liang, Yachao, Li, Min, Huang, Weiqing

    “…Deepfake detection attracts increasingly attention due to serious security issues caused by facial manipulation techniques. Recently, deep learning-based…”
    Get full text
    Journal Article
  9. 9
  10. 10

    The juridical spheres for digital forensics and electronic evidence in the insecure electronic world by Losavio, Michael Martin, Pastukov, Pavel, Polyakova, Svetlana, Zhang, Xuan, Chow, Kam Pui, Koltay, Andras, James, Joshua, Ortiz, Miguel Etchart

    Published in WIREs. Forensic science (01-09-2019)
    “…With so much information collected from so many places and stored in so many others, the forensic value of digital evidence has exploded globally. This ranges…”
    Get full text
    Journal Article
  11. 11

    Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis by Fan, Xiao-Xi, Chow, Kam-Pui

    “…The growing popularity of cyberlocker service has led to significant impact on the Internet that it is considered as one of the biggest contributors to the…”
    Get full text
    Journal Article
  12. 12

    Sensitivity Analysis of a Bayesian Network for Reasoning about Digital Forensic Evidence by Overill, R E, Silomon, J A M, Kwan, M Y K, Kam-Pui Chow, Law, F Y W, Lai, P K Y

    “…A Bayesian network representing an actual prosecuted case of illegal file sharing over a peer-to-peer network has been subjected to a systematic and rigorous…”
    Get full text
    Conference Proceeding
  13. 13

    Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction by Wang, Tianyi, Chow, Kam Pui

    “…Threat intelligence, information about potential or current attacks to an organization, is an important component in cyber security territory. As new threats…”
    Get full text
    Conference Proceeding
  14. 14

    Time and Location Topic Model for analyzing Lihkg forum data by Shen, Ao, Chow, Kam Pui

    “…Open Source Intelligence (OSINT) is a choice for collecting information today for law enforcement to monitor illegal activities and allocate police resources…”
    Get full text
    Conference Proceeding
  15. 15

    Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach by Wang, Tianyi, Qin, Shengzhi, Chow, Kam Pui

    “…The wake of increasing malicious cyberattack cases has aroused people's attention on cybersecurity and vulnerabilities. Common Vulnerabilities and Exposures…”
    Get full text
    Conference Proceeding
  16. 16

    Deep Convolutional Pooling Transformer for Deepfake Detection by Wang, Tianyi, Cheng, Harry, Chow, Kam Pui, Nie, Liqiang

    Published 29-03-2023
    “…Recently, Deepfake has drawn considerable public attention due to security and privacy concerns in social media digital forensics. As the wildly spreading…”
    Get full text
    Journal Article
  17. 17

    Deepfake Detection: A Comprehensive Survey from the Reliability Perspective by Wang, Tianyi, Liao, Xin, Chow, Kam Pui, Lin, Xiaodong, Wang, Yinglong

    Published 04-10-2024
    “…The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals…”
    Get full text
    Journal Article
  18. 18

    k-Dimensional hashing scheme for hard disk integrity verification in computer forensics by Jiang, Zoe Lin, Fang, Jun-bin, Hui, Lucas Chi Kwong, Yiu, SiuMing, Chow, Kam Pui, Sheng, Meng-meng

    “…Verifying the integrity of a hard disk is an important concern in computer forensics, as the law enforcement party needs to confirm that the data inside the…”
    Get full text
    Journal Article
  19. 19

    Forensic-Aware Anti-DDoS Device by Chi Yuen Tseung, Kam Pui Chow

    “…When defending DDoS and other types of network attack, most products or service providers perform the protection by dropping the attack traffics. It cures the…”
    Get full text
    Conference Proceeding
  20. 20

    A Complexity Based Model for Quantifying Forensic Evidential Probabilities by Overill, R.E., Silomon, J.A.M., Kam-Pui Chow

    “…An operational complexity model (OCM) is proposed to enable the complexity of both the cognitive and the computational components of a process to be…”
    Get full text
    Conference Proceeding