Yee Wei Law
Cited by
Cited by
The sixth visual object tracking vot2018 challenge results
M Kristan, A Leonardis, J Matas, M Felsberg, R Pflugfelder, ...
Proceedings of the European conference on computer vision (ECCV) workshops, 0-0, 2018
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, YW Law
International workshop on radio frequency identification: security and†…, 2011
Survey and benchmark of block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga
ACM Transactions on Sensor Networks (TOSN) 5 (1), 1-38, 2009
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
R Di Pietro, LV Mancini, YW Law, S Etalle, P Havinga
2003 International Conference on Parallel Processing Workshops, 2003†…, 2003
Enhanced LTE-advanced random-access mechanism for massive machine-to-machine (M2M) communications
A Lo, YW Law, M Jacobsson, M Kucharzak
27th World Wireless Research Forum (WWRF) Meeting 2011, 2011
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
Proceeedings of the Second European Workshop on Wireless Sensor Networks†…, 2005
Security games for risk minimization in automatic generation control
YW Law, T Alpcan, M Palaniswami
IEEE Transactions on Power Systems 30 (1), 223-232, 2014
Assessing security in energy-efficient sensor networks
YW Law, S Etalle, PH Hartel
Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th†…, 2003
A cellular-centric service architecture for machine-to-machine (M2M) communications
A Lo, YW Law, M Jacobsson
IEEE wireless communications 20 (5), 143-151, 2013
WAKE: Key management scheme for wide-area measurement systems in smart grid
YW Law, M Palaniswami, G Kounga, A Lo
IEEE Communications Magazine 51 (1), 34-41, 2013
Demand response architectures and load management algorithms for energy-efficient power grids: a survey
YW Law, T Alpcan, VCS Lee, A Lo, S Marusic, M Palaniswami
2012 seventh international conference on knowledge, information and†…, 2012
Privacy-preserving collaborative deep learning with application to human activity recognition
L Lyu, X He, YW Law, M Palaniswami
Proceedings of the 2017 ACM on Conference on Information and Knowledge†…, 2017
A formally verified decentralized key management architecture for wireless sensor networks
YW Law, R Corin, S Etalle, PH Hartel
Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC†…, 2003
Benchmarking block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE†…, 2004
How to secure a wireless sensor network
YW Law, PJM Havinga
2005 International Conference on Intelligent Sensors, Sensor Networks and†…, 2005
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
UAV-GESTURE: A dataset for UAV control and gesture recognition
AG Perera, Y Wei Law, J Chahl
Proceedings of the European Conference on Computer Vision (ECCV) Workshops, 0-0, 2018
Drone-action: An outdoor recorded drone video dataset for action recognition
AG Perera, YW Law, J Chahl
Drones 3 (4), 82, 2019
Physical adversarial attacks on an aerial imagery object detector
A Du, B Chen, TJ Chin, YW Law, M Sasdelli, R Rajasegaran, D Campbell
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer†…, 2022
The system can't perform the operation now. Try again later.
Articles 1–20