Search Results - "Yang, Wai Wai"
-
1
Parents' online coaching in the early intervention home program for toddlers with autism spectrum disorder during the COVID-19 pandemic: Manual development and feasibility study
Published in PloS one (15-10-2024)“…Early intervention improves the developmental progress among toddlers with ASD. Family involvement enhances the intervention outcome. This study aimed to…”
Get full text
Journal Article -
2
A Comprehensive Overview of IoT-Based Federated Learning: Focusing on Client Selection Methods
Published in Sensors (Basel, Switzerland) (01-08-2023)“…The integration of the Internet of Things (IoT) with machine learning (ML) is revolutionizing how services and applications impact our daily lives. In…”
Get full text
Journal Article -
3
Interactive three-dimensional visualization of network intrusion detection data for machine learning
Published in Future generation computer systems (01-01-2020)“…The threat of cyber-attacks is on the rise in the digital world today. As such, effective cybersecurity solutions are becoming increasingly important for…”
Get full text
Journal Article -
4
Privacy-preserving file sharing on cloud storage with certificateless signcryption
Published in Theoretical computer science (19-05-2022)“…In recent years, data generated by Internet of Things (IoT) devices has become increasingly massive. The amount of data stored in the cloud is also enormous…”
Get full text
Journal Article -
5
PCSF: Privacy-Preserving Content-based Spam Filter
Published in IEEE transactions on information forensics and security (01-01-2023)“…The purpose of privacy-preserving spam filtering is to inspect email while preserving the privacy of its detection rules and the email content. Although many…”
Get full text
Journal Article -
6
Decisional style, sleepiness, and online responsiveness
Published in Ergonomics (01-09-2024)“…As sleep problems can impair quality of work, an online questionnaire was used to examine relationships between sleepiness and decision making while obtaining…”
Get full text
Journal Article -
7
Visualization and Cybersecurity in the Metaverse: A Survey
Published in Journal of imaging (31-12-2022)“…The popularity of the Metaverse has rapidly increased in recent years. However, despite the attention, investment, and promise of the Metaverse, there are…”
Get full text
Journal Article -
8
Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review
Published in Computers (Basel) (01-01-2024)“…Health information systems (HISs) have immense value for healthcare institutions, as they provide secure storage, efficient retrieval, insightful analysis,…”
Get full text
Journal Article -
9
Strategic Approaches to Cybersecurity Learning: A Study of Educational Models and Outcomes
Published in Information (Basel) (01-02-2024)“…As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred…”
Get full text
Journal Article -
10
Antineutrophil cytoplasmic antibody‐negative pauci‐immune glomerulonephritis in a patient with Waldenstrom macroglobulinaemia
Published in Nephrology (Carlton, Vic.) (01-11-2024)“…Waldenstrom macroglobulinaemia (WM), the predominant subtype of lymphoplasmacytic lymphoma with bone marrow involvement and serum IgM paraprotein, is a…”
Get full text
Journal Article -
11
Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response
Published in Telecom (Basel) (01-12-2023)“…Software-defined networking (SDN) is an innovative technology that has the potential to enhance the scalability, flexibility, and security of…”
Get full text
Journal Article -
12
The search term ‘suicide’ is being used to lead web browsers to online casinos
Published in Behaviour & information technology (05-01-2024)Get full text
Journal Article -
13
Complementary and alternative medicine (CAM) use and delays in presentation and diagnosis of breast cancer patients in public hospitals in Malaysia
Published in PloS one (27-04-2017)“…Complementary and alternative medicine (CAM) is widely used among the breast cancer patients in Malaysia. Delays in presentation, diagnosis and treatment have…”
Get full text
Journal Article -
14
HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference
Published in Future internet (01-12-2023)“…Homomorphic encryption (HE) has emerged as a pivotal technology for secure neural network inference (SNNI), offering privacy-preserving computations on…”
Get full text
Journal Article -
15
Comparison of post‐operative pain in short versus long stitch technique for abdominal wall closure after elective laparotomy: a double‐blind randomized controlled trial
Published in ANZ journal of surgery (01-05-2021)“…Background Conventional mass closure uses suture‐to‐wound length ratio of 4:1 (‘long stitch’, LS). ‘Short stitch’ (SS) has a suture‐to‐wound length ratio of…”
Get full text
Journal Article -
16
-
17
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…While deep learning techniques have achieved great success in modern digital products, researchers have shown that deep learning models are susceptible to…”
Get full text
Conference Proceeding -
18
Context-Driven Satire Detection With Deep Learning
Published in IEEE access (2022)“…This work discuss the task of automatically detecting satire instances in short articles. It is the study of extracting the most optimal features by using a…”
Get full text
Journal Article -
19
Ulcerative colitis-specific delivery of keratinocyte growth factor by neutrophils-simulated liposomes facilitates the morphologic and functional recovery of the damaged colon through alleviating the inflammation
Published in Journal of controlled release (10-04-2019)“…Keratinocyte growth factor (KGF) was effective to treat ulcerative colitis. However, its poor stability and unspecific distribution toward inflamed bowel were…”
Get full text
Journal Article -
20
Functional Encryption for Pattern Matching with a Hidden String
Published in Cryptography (01-03-2022)“…We propose a new functional encryption for pattern matching scheme with a hidden string. In functional encryption for pattern matching (FEPM), access to a…”
Get full text
Journal Article