Follow
David K Y Yau
Title
Cited by
Cited by
Year
Automatic Image Segmentation by Integrating Color-Edge Extraction and Seeded Region Growing
J Fan, DKY Yau, AK Elmagarmid, WG Aref
IEEE Transactions On Image Processing 10 (10), 1454-1466, 2001
9712001
Automatic Image Segmentation by Integrating Color-Edge Extraction and Seeded Region Growing
J Fan, DKY Yau, AK Elmagarmid, W Aref
IEEE transactions on image processing 10 (10), 2001
9662001
Energy provisioning in wireless rechargeable sensor networks
S He, J Chen, F Jiang, DKY Yau, G Xing, Y Sun
IEEE transactions on mobile computing 12 (10), 1931-1942, 2012
7722012
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
DKY Yau, JCS Lui, F Liang, Y Yam
IEEE/ACM Transactions On Networking 13 (1), 29-42, 2005
4672005
Privacy vulnerability of published anonymous mobility traces
CYT Ma, DKY Yau, NK Yip, NSV Rao
Proceedings of the sixteenth annual international conference on Mobile …, 2010
3192010
Defending against low-rate TCP attacks: Dynamic detection and protection
H Sun, JCS Lui, DKY Yau
Proceedings of the 12th IEEE International Conference on Network Protocols …, 2004
2282004
Defending against low-rate TCP attacks: Dynamic detection and protection
H Sun, JCS Lui, DKY Yau
Proceedings of the 12th IEEE International Conference on Network Protocols …, 2004
2282004
Incentive and service differentiation in P2P networks: a game theoretic approach
RTB Ma, SCM Lee, JCS Lui, DKY Yau
Ieee/ACM Transactions on networking 14 (5), 978-991, 2006
2252006
Incentive and service differentiation in P2P networks: a game theoretic approach
RTB Ma, SCM Lee, JCS Lui, DKY Yau
Ieee/ACM Transactions on networking 14 (5), 978-991, 2006
2252006
Modeling and mitigating impact of false data injection attacks on automatic generation control
R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi
IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017
2202017
Modeling and mitigating impact of false data injection attacks on automatic generation control
R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi
IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017
2202017
Modeling and mitigating impact of false data injection attacks on automatic generation control
R Tan, HH Nguyen, EYS Foo, DKY Yau, Z Kalbarczyk, RK Iyer, HB Gooi
IEEE Transactions on Information Forensics and Security 12 (7), 1609-1624, 2017
2202017
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu
IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018
2122018
Cross-layer optimization of correlated data gathering in wireless sensor networks
S He, J Chen, DKY Yau, Y Sun
IEEE Transactions on Mobile Computing 11 (11), 1678-1691, 2011
2042011
An algorithm for lossless smoothing of MPEG video
SS Lam, S Chow, DKY Yau
ACM SIGCOMM Computer Communication Review 24 (4), 281-293, 1994
1971994
An algorithm for lossless smoothing of MPEG video
SS Lam, S Chow, DKY Yau
ACM SIGCOMM Computer Communication Review 24 (4), 281-293, 1994
1971994
A game theoretic approach to provide incentive and service differentiation in P2P networks
RTB Ma, S Lee, J Lui, DKY Yau
ACM SIGMETRICS Performance Evaluation Review 32 (1), 189-198, 2004
1862004
Adaptive rate-controlled scheduling for multimedia applications
DKY Yau, SS Lam
Proceedings of the fourth ACM international conference on multimedia, 129-140, 1997
1551997
Markov game analysis for attack-defense of power networks under possible misinformation
CYT Ma, DKY Yau, X Lou, NSV Rao
IEEE Transactions on Power Systems 28 (2), 1676-1686, 2012
1332012
A hybrid architecture for cost-effective on-demand media streaming
MM Hefeeda, BK Bhargava, DKY Yau
Computer Networks 44 (3), 353-382, 2004
1332004
The system can't perform the operation now. Try again later.
Articles 1–20