Automatic Image Segmentation by Integrating Color-Edge Extraction and Seeded Region Growing J Fan, DKY Yau, AK Elmagarmid, WG Aref IEEE Transactions On Image Processing 10 (10), 1454-1466, 2001 | 970 | 2001 |
Automatic Image Segmentation by Integrating Color-Edge Extraction and Seeded Region Growing J Fan, DKY Yau, AK Elmagarmid, W Aref IEEE transactions on image processing 10 (10), 2001 | 965 | 2001 |
Energy provisioning in wireless rechargeable sensor networks S He, J Chen, F Jiang, DKY Yau, G Xing, Y Sun IEEE transactions on mobile computing 12 (10), 1931-1942, 2012 | 772 | 2012 |
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles DKY Yau, JCS Lui, F Liang, Y Yam IEEE/ACM Transactions On Networking 13 (1), 29-42, 2005 | 467 | 2005 |
Privacy vulnerability of published anonymous mobility traces CYT Ma, DKY Yau, NK Yip, NSV Rao Proceedings of the sixteenth annual international conference on Mobile
, 2010 | 319 | 2010 |
Defending against low-rate TCP attacks: Dynamic detection and protection H Sun, JCS Lui, DKY Yau Proceedings of the 12th IEEE International Conference on Network Protocols
, 2004 | 228 | 2004 |
Defending against low-rate TCP attacks: Dynamic detection and protection H Sun, JCS Lui, DKY Yau Proceedings of the 12th IEEE International Conference on Network Protocols
, 2004 | 228 | 2004 |
Incentive and service differentiation in P2P networks: a game theoretic approach RTB Ma, SCM Lee, JCS Lui, DKY Yau Ieee/ACM Transactions on networking 14 (5), 978-991, 2006 | 225 | 2006 |
Incentive and service differentiation in P2P networks: a game theoretic approach RTB Ma, SCM Lee, JCS Lui, DKY Yau Ieee/ACM Transactions on networking 14 (5), 978-991, 2006 | 225 | 2006 |
Modeling and mitigating impact of false data injection attacks on automatic generation control R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017 | 222 | 2017 |
Modeling and mitigating impact of false data injection attacks on automatic generation control R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017 | 222 | 2017 |
Modeling and mitigating impact of false data injection attacks on automatic generation control R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017 | 222 | 2017 |
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018 | 214 | 2018 |
Cross-layer optimization of correlated data gathering in wireless sensor networks S He, J Chen, DKY Yau, Y Sun IEEE Transactions on Mobile Computing 11 (11), 1678-1691, 2011 | 203 | 2011 |
An algorithm for lossless smoothing of MPEG video SS Lam, S Chow, DKY Yau ACM SIGCOMM Computer Communication Review 24 (4), 281-293, 1994 | 197 | 1994 |
An algorithm for lossless smoothing of MPEG video SS Lam, S Chow, DKY Yau ACM SIGCOMM Computer Communication Review 24 (4), 281-293, 1994 | 197 | 1994 |
A game theoretic approach to provide incentive and service differentiation in P2P networks RTB Ma, S Lee, J Lui, DKY Yau ACM SIGMETRICS Performance Evaluation Review 32 (1), 189-198, 2004 | 186 | 2004 |
Adaptive rate-controlled scheduling for multimedia applications DKY Yau, SS Lam Proceedings of the fourth ACM international conference on multimedia, 129-140, 1997 | 155 | 1997 |
Markov game analysis for attack-defense of power networks under possible misinformation CYT Ma, DKY Yau, X Lou, NSV Rao IEEE Transactions on Power Systems 28 (2), 1676-1686, 2012 | 134 | 2012 |
A hybrid architecture for cost-effective on-demand media streaming MM Hefeeda, BK Bhargava, DKY Yau Computer Networks 44 (3), 353-382, 2004 | 133 | 2004 |