Dr. YEUNG Kai Hau Alan (楊啟厚)

Research Output

  1. 2021
  2. Published

    Exact Transient Analysis on LRU Cache Startup for Internet of Things

    Wong, A. K. Y., Yeung, A. K. H., Choi, K., Lei, P. & Lam, C., Dec 2021, ICIT 2021 - Proceedings of the 9th International Conference on Information Technology: IoT and Smart City. Association for Computing Machinery, p. 310-315 (ACM International Conference Proceeding Series).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

    Check@CityULib
  3. Published

    System And Method for Controlling Operation of an Autonomous Vehicles

    YEUNG, K. H. A. & ZUKERMAN, M., 6 Jul 2021, Patent No. US11,052,918, Priority No. 16/145,672

    Research output: Patents, Agreements and Assignments (RGC: 51, 52, 53)51_Patents granted (CityU only, data source from KTO)

    Check@CityULib
  4. Published

    System and method for controlling operation of an autonomous vehicles

    YEUNG, K. H. A. & ZUKERMAN, M., 26 Jan 2021, Patent No. US10,901,413, Priority No. 16/007,065

    Research output: Patents, Agreements and Assignments (RGC: 51, 52, 53)51_Patents granted (CityU only, data source from KTO)

    Check@CityULib
  5. 2019
  6. Published

    Blockchain-Based Authentication for Network Infrastructure Security

    Lau, C. H., Yeung, K. & Kwong, K. M., Jul 2019, Intelligent Computing: Proceedings of the 2019 Computing Conference. Arai, K., Bhatia, R. & Kapoor, S. (eds.). Springer Nature Switzerland AG, Vol. 2. p. 462-473 (Advances in Intelligent Systems and Computing; vol. 998).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

    Check@CityULib
  7. Published

    A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology

    Liang, J., Ma, M., Sadiq, M. & Yeung, K., 1 Jan 2019, In: Knowledge-Based Systems. 163, p. 611-623

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 29
    Check@CityULib
  8. 2018
  9. Published

    Blockchain-Based Authentication in IoT Networks

    Lau, C. H., Yeung, A. K. & Yan, F., Dec 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 8625141. (DSC - IEEE Conference on Dependable and Secure Computing).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

    Scopus citations: 17
    Check@CityULib
  10. Published

    Exploring the impact of social properties on routing in cognitive radio networks

    Hou, L., Wong, K. & Yeung, K., Oct 2018, In: International Journal of Communication Systems. 31, 15, e3782.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 3
    Check@CityULib
  11. Online published

    Clustering-Based Mobile Gateway Management in Integrated CRAHN-Cloud Network

    Hon, L., Wong, A. K. Y., Yeung, A. K. H. & Choy, S. S. O., 31 Jul 2018, (Online published) In: KSII Transactions on Internet and Information Systems. 12, 7, p. 2960-2976

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Check@CityULib
  12. 2017
  13. Published

    Using trust management to defend against routing disruption attacks for cognitive radio networks

    Hou, L., Wong, A. K. Y., Yeung, A. K. H. & Choy, S. S. O., 9 Feb 2017, 2016 IEEE International Conference on Consumer Electronics-China, ICCE-China 2016. Institute of Electrical and Electronics Engineers Inc., 7849766

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

    Scopus citations: 2
    Check@CityULib
  14. 2015
  15. Published

    Overlapping community structure detection in multi-online social networks

    Fan, W., Yeung, K. & Fan, W., 31 Mar 2015, 2015 18th International Conference on Intelligence in Next Generation Networks, ICIN 2015. Institute of Electrical and Electronics Engineers Inc., p. 239-243 7073837

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

    Scopus citations: 6
    Check@CityULib
  16. Published

    Similarity between community structures of different online social networks and its impact on underlying community detection

    Fan, W. & Yeung, K. H., Mar 2015, In: Communications in Nonlinear Science and Numerical Simulation. 20, 3, p. 1015-1025

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 18
    Check@CityULib
  17. Published

    SEER: spectrum- and energy-efficient routing protocol for cognitive radio ad hoc networks

    Hou, L., Yeung, K. H. & Wong, K. Y., 19 Feb 2015, In: Wireless Networks. 21, 7, p. 2357-2368

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 6
    Check@CityULib
  18. Published

    Degree-energy-based local random routing strategies for sensor networks

    Yan, F., Yeung, A. K. H., Joseph, A. C. & Chen, G., Jan 2015, In: Communications in Nonlinear Science and Numerical Simulation. 20, 1, p. 250-262

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 7
    Check@CityULib
  19. Published

    ENERGY-EFFICIENT ROUTING PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS: A Q-LEARNING APPROACH

    HOU, L., YEUNG, K. H. & WONG, A. K. Y., 2015, Cognitive Networks: Applications and Deployments. Lloret Mauri, J., Ghafoor, K. Z., Rawat, D. B. & Aguiar Perez, J. M. (eds.). Boca Raton: CRC Press, p. 377-400

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)12_Chapter in an edited book (Author)

    Check@CityULib
  20. 2014
  21. Published

    Trust and privacy exploitation in online social networks

    Wong, K., Wong, A., Yeung, A., Fan, W. & Tang, S., 1 Sep 2014, In: IT Professional. 16, 5, p. 28-33 6908929.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 9
    Check@CityULib
  22. Published

    Community-based cheater detection in location-based social networks

    Fan, W., Fan, W., Liao, S. S. & Yeung, K., Aug 2014, ASONAM 2014 - Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Institute of Electrical and Electronics Engineers Inc., p. 936-941 6921698

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

    Scopus citations: 1
    Check@CityULib
  23. Published

    Incorporating profile information in community detection for online social networks

    Fan, W. & Yeung, K. H., 1 Jul 2014, In: Physica A: Statistical Mechanics and its Applications. 405, p. 226-234

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 8
    Check@CityULib
  24. Published

    link availability prediction for cognitive radio ad hoc networks

    HOU, L., YEUNG, K. H. & WONG, K. Y., 13 Apr 2014, In: Journal of Computer and Communications. 2, 6, p. 18 - 24

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Check@CityULib
  25. Published

    A BLE-based mobile cloud architecture for longer smart mobile device battery life

    Mao, J. & Yeung, K. H., 2014, Internet of Vehicles - Technologies and Services: First International Conference, IOV 2014, Proceedings. Springer Verlag, Vol. 8662 LNCS. p. 337-344 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8662 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)peer-review

    Scopus citations: 1
    Check@CityULib
  26. Published

    Attacks by Exploiting Trust and Privacy in Online Social Networks

    WONG, K. Y., WONG, A., YEUNG, K. H., FAN, W. & TANG, S. K., 2014, In: Computer.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Check@CityULib
Previous 1 2 3 4 5 Next