Protecting Confidential Data on Personal Computers with Storage Capsules. K Borders, E Vander Weele, B Lau, A Prakash USENIX Security Symposium, 367-382, 2009 | 85 | 2009 |
Mimesis aegis: A mimicry privacy shield–a system’s approach to data privacy on public cloud B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva 23rd {USENIX} Security Symposium ({USENIX} Security 14), 33-48, 2014 | 69 | 2014 |
Sensor fusion for public space utilization monitoring in a smart city BPL Lau, N Wijerathne, BKK Ng, C Yuen IEEE Internet of Things Journal 5 (2), 473-481, 2017 | 61 | 2017 |
A survey of data fusion in smart city applications BPL Lau, SH Marakkalage, Y Zhou, NU Hassan, C Yuen, M Zhang, ... Information Fusion 52, 357-374, 2019 | 47 | 2019 |
Mactans: Injecting malware into iOS devices via malicious chargers B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal Black Hat USA 92, 2013 | 46 | 2013 |
Understanding urban human mobility through crowdsensed data Y Zhou, BPL Lau, C Yuen, B Tunçer, E Wilhelm IEEE Communications Magazine 56 (11), 52-59, 2018 | 23 | 2018 |
On the feasibility of large-scale infections of ios devices T Wang, Y Jang, Y Chen, S Chung, B Lau, W Lee 23rd {USENIX} Security Symposium ({USENIX} Security 14), 79-93, 2014 | 21 | 2014 |
Understanding the lifestyle of older population: Mobile crowdsensing approach SH Marakkalage, S Sarica, BPL Lau, SK Viswanath, T Balasubramaniam, ... IEEE Transactions on Computational Social Systems 6 (1), 82-95, 2018 | 19 | 2018 |
Extracting point of interest and classifying environment for low sampling crowd sensing smartphone sensor data BPL Lau, MS Hasala, VS Kadaba, B Thirunavukarasu, C Yuen, B Yuen, ... 2017 IEEE International Conference on Pervasive Computing and Communications …, 2017 | 16 | 2017 |
A review on dependence graph in social reasoning mechanism BPL Lau, AK Singh, TPL Tan Artificial Intelligence Review 43 (2), 229-242, 2015 | 13 | 2015 |
Spatial and temporal analysis of urban space utilization with renewable wireless sensor network BPL Lau, T Chaturvedi, BKK Ng, K Li, MS Hasala, C Yuen 2016 IEEE/ACM 3rd International Conference on Big Data Computing …, 2016 | 11 | 2016 |
Understanding Crowd Behaviors in a Social Event by Passive WiFi Sensing and Data Mining Y Zhou, BPL Lau, Z Koh, C Yuen, BKK Ng IEEE Internet of Things Journal 7 (5), 4442-4454, 2020 | 5 | 2020 |
Identifying points of interest for elderly in singapore through mobile crowdsensing SH Marakkalage, BPL Lau, VS Kadaba, T Balasubramaniam, C Yuen, ... | 5 | 2017 |
Weighted voting game based algorithm for joining a microscopic coalition BPL Lau, AK Singh, TPL Tan 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), 1-4, 2013 | 5 | 2013 |
Systems and methods of safeguarding user information while interacting with online service providers W Lee, A Boldyreva, CP Ho, B Lau, C Song US Patent 9,659,189, 2017 | 4 | 2017 |
Exploiting unpatched ios vulnerabilities for fun and profit Y Jang, T Wang, B Lee, B Lau Black Hat USA, 2014 | 4 | 2014 |
Mimesis aegis: a mimicry privacy shield B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva Georgia Institute of Technology, 2014 | 4 | 2014 |
Direct access to graphics card leveraging VT-d BH Ng, B Lau, A Parkash University of Michigan, Tech. Rep, 1-13, 2009 | 4 | 2009 |
T-DepExp: Simulating transitive dependence based coalition formation B Lau, A Singh, TPL Tan Pertanika Journal of Science and Technology 23 (1), 105-117, 2015 | 3 | 2015 |
From microstructure to the development of water and major reaction sites inside the catalyst layer of the cathode of a proton exchange membrane fuel cell MS Lee, TH Chen, WS Lee, BS Lin, BY Lau, PF Tsai, GC Wang Journal of Power Sources 196 (18), 7411-7419, 2011 | 3 | 2011 |