Search Results - "Liu, Vicky"
-
1
Connector article: What effect has the SEC's whistleblower award program had on ponzi schemes and their victims?: - more Canadian content
Published in Manitoba law journal (1966) (01-07-2022)“…In Janet Austin's article, the author provides various data released by the United States Securities and Exchange Commission ("SEC") to highlight the impact of…”
Get full text
Journal Article -
2
An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid
Published in Sensors (Basel, Switzerland) (25-08-2023)“…IEEE 802.11ah, or Wi-Fi HaLow, is a long-range Internet of Things (IoT) communication technology with promising performance claims. Being IP-based makes it an…”
Get full text
Journal Article -
3
Security and Performance in IoT: A Balancing Act
Published in IEEE access (2020)“…With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, performance of these low powered devices, as well as…”
Get full text
Journal Article -
4
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market
Published in IEEE access (01-01-2020)“…Energy market trading systems are undergoing rapid transformation due to an increasing demand for renewable energy sources to be integrated into the power…”
Get full text
Journal Article -
5
Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
Published in IEEE access (2022)“…The IoT based smart grid provides many benefits to both energy consumers and energy producers, such as advanced metering functions, improved reliability, and…”
Get full text
Journal Article -
6
An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market
Published in IEEE access (2021)“…The auditability of telephone call records plays an essential governance role in the electricity industry in Australia as non-compliance with the Australian…”
Get full text
Journal Article -
7
Energy-Aware Forwarding Strategies for Delay Tolerant Network Routing Protocols
Published in Journal of sensor and actuator networks (01-12-2016)“…Delay Tolerant Networking (DTN) is well suited to challenging environments, defined by the lack of reliable end-to-end communication paths to the destination…”
Get full text
Journal Article -
8
-
9
Multi-aspect attentive text representations for simple question answering over knowledge base
Published in Natural Language Processing Journal (01-12-2023)Get full text
Journal Article -
10
INNV-15. PROTEIN TYPING AND MRNA ANALYSIS OF CIRCULATING EXOSOMES FOR GLIOBLASTOMA THERAPY USING PLASMONIC-ENHANCED INTEGRATED MAGNETO-ELECTROCHEMICAL SENSOR
Published in Neuro-oncology (Charlottesville, Va.) (12-11-2021)“…Monitoring of drug efficacy in glioblastoma multiforme (GBM) is a major clinical problem. Glioblastomas shed large quantities of exosomes into the circulation…”
Get full text
Journal Article -
11
Robustness and Security Enhancement of Radio Frequency Fingerprint Identification in Time-Varying Channels
Published 09-10-2024“…Radio frequency fingerprint identification (RFFI) is becoming increasingly popular, especially in applications with constrained power, such as the Internet of…”
Get full text
Journal Article -
12
Seal Culture Still Remains in Electronic Commerce: History of Seal and Printing Cultures
Published in M/C journal (01-06-2005)“…History of Seal and Printing Cultures Implications of the four important Chinese inventions, the compass, gun powder, papermaking, and printing, have…”
Get full text
Journal Article -
13
On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels
Published in 2023 IEEE 34th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) (05-09-2023)“…Radio frequency fingerprint identification (RFFI) is a lightweight device authentication technique particularly desirable for power-constrained devices, e.g.,…”
Get full text
Conference Proceeding -
14
On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels
Published 27-02-2023“…Radio frequency fingerprint identification (RFFI) is a lightweight device authentication technique particularly desirable for power-constrained devices, e.g.,…”
Get full text
Journal Article -
15
Modeling for a QoS-Efficient Real-Time Video Conferencing System in the Cloud
Published in 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) (01-09-2018)“…Recently on-premises deployed real-time video conferencing (VC) systems have been facing the growing resource demand from using desktop and mobile devices. To…”
Get full text
Conference Proceeding -
16
Design and Implementation of Unified Communications as a Service Based on the Open Stack Cloud Environment
Published in 2015 IEEE International Conference on Computational Intelligence & Communication Technology (01-02-2015)“…Cloud Computing, based on early virtual computer concepts and technologies, is now itself a maturing technology in the marketplace and it has revolutionized…”
Get full text
Conference Proceeding -
17
Modeling for performance and security balanced trading communication systems in the cloud
Published in 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC) (01-12-2017)“…Moving Trading Communication Systems (TCSs) services to the cloud may seem to be a cost-effective choice. However, operating cloud-based TCSs across the…”
Get full text
Conference Proceeding -
18
Performance Analysis of Secure Unified Communications in the VMware-Based Cloud
Published in 2015 International Conference on Computational Intelligence and Communication Networks (CICN) (01-12-2015)“…Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud…”
Get full text
Conference Proceeding Journal Article -
19
Utilizing SELinux to mandate ultra-secure access control of medical records
Published in Studies in health technology and informatics (2007)“…Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data…”
Get more information
Journal Article -
20
Network security metrics and performance for healthcare systems management
Published in 2015 17th International Conference on E-health Networking, Application & Services (HealthCom) (01-10-2015)“…While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take…”
Get full text
Conference Proceeding