Exploiting the error correction mechanism in QR codes for secret sharing YW Chow, W Susilo, G Yang, JG Phillips, I Pranata, AM Barmawi Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 90 | 2016 |
Interactive three-dimensional visualization of network intrusion detection data for machine learning W Zong, YW Chow, W Susilo Future Generation Computer Systems 102, 292-306, 2020 | 77 | 2020 |
Visualization and cybersecurity in the metaverse: A survey YW Chow, W Susilo, Y Li, N Li, C Nguyen Journal of Imaging 9 (1), 11, 2022 | 52 | 2022 |
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview. YW Chow, W Susilo, JG Phillips, J Baek, E Vlahu-Gjorgievska J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (3), 18-35, 2017 | 51 | 2017 |
Gambling involvement and increased risk of gambling problems JG Phillips, R Ogeil, YW Chow, A Blaszczynski Journal of Gambling Studies 29, 601-611, 2013 | 48 | 2013 |
Metamorphic testing of navigation software: A pilot study with Google Maps J Brown, ZQ Zhou, YW Chow | 47 | 2018 |
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext W Susilo, R Chen, F Guo, G Yang, Y Mu, YW Chow Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 47 | 2016 |
A two-stage classifier approach for network intrusion detection W Zong, YW Chow, W Susilo Information Security Practice and Experience: 14th International Conference …, 2018 | 45 | 2018 |
A QR code watermarking approach based on the DWT-DCT technique YW Chow, W Susilo, J Tonien, W Zong Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 41 | 2017 |
Cooperative secret sharing using QR codes and symmetric keys YW Chow, W Susilo, J Tonien, E Vlahu-Gjorgievska, G Yang Symmetry 10 (4), 95, 2018 | 37 | 2018 |
Low-cost multiple degrees-of-freedom optical tracking for 3D interaction in head-mounted display virtual reality YW Chow International Journal of Recent Trends in Engineering 1 (1), 52, 2009 | 32 | 2009 |
Breaking an animated CAPTCHA scheme VD Nguyen, YW Chow, W Susilo Applied Cryptography and Network Security: 10th International Conference …, 2012 | 31 | 2012 |
AniCAP: An animated 3D CAPTCHA scheme based on motion parallax YW Chow, W Susilo Cryptology and Network Security: 10th International Conference, CANS 2011 …, 2011 | 30 | 2011 |
CAPTCHA design and security issues YW Chow, W Susilo, P Thorncharoensri Advances in Cyber Security: Principles, Techniques, and Applications, 69-92, 2019 | 29 | 2019 |
On the security of text-based 3D CAPTCHAs VD Nguyen, YW Chow, W Susilo Computers & security 45, 84-99, 2014 | 29 | 2014 |
The Wii Remote as an input device for 3D interaction in immersive head-mounted display virtual reality YW Chow Proceedings of IADIS International Conference Gaming, 85-92, 2008 | 28 | 2008 |
Breaking a 3D-based CAPTCHA scheme VD Nguyen, YW Chow, W Susilo Information Security and Cryptology-ICISC 2011: 14th International …, 2012 | 26 | 2012 |
3D spatial interaction with the Wii remote for head-mounted display virtual reality YW Chow | 25 | 2009 |
Security and privacy of technologies in health information systems: A systematic literature review P Shojaei, E Vlahu-Gjorgievska, YW Chow Computers 13 (2), 41, 2024 | 24 | 2024 |
A visual one-time password authentication scheme using mobile devices YW Chow, W Susilo, MH Au, AM Barmawi Information and Communications Security: 16th International Conference …, 2015 | 23 | 2015 |