- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Cryptography and Data Security
- Coding theory and cryptography
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Advanced Steganography and Watermarking Techniques
- Emotion and Mood Recognition
- Advanced Malware Detection Techniques
- Face and Expression Recognition
- Digital Media Forensic Detection
- Biometric Identification and Security
- Internet Traffic Analysis and Secure E-voting
- Information and Cyber Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Network Security and Intrusion Detection
- Security in Wireless Sensor Networks
- RFID technology advancements
- Anomaly Detection Techniques and Applications
- Cryptography and Residue Arithmetic
- Complexity and Algorithms in Graphs
- IPv6, Mobility, Handover, Networks, Security
- Face recognition and analysis
- Speech and Audio Processing
- Privacy-Preserving Technologies in Data
Monash University
2020-2025
Monash University Malaysia
2019-2025
Software (Spain)
2023
Australian Regenerative Medicine Institute
2022
Multimedia University
2001-2020
Loughborough University
2007-2013
Swinburne University of Technology Sarawak Campus
2002-2011
University of Technology Malaysia
2007-2011
Swinburne University of Technology
2003-2011
École Polytechnique Fédérale de Lausanne
2007-2008
The Internet of Things (IoT) has penetrated deeply into our lives and the number IoT devices per person is expected to increase substantially over next few years. Due characteristics (i.e., low power battery), usage these in critical applications requires sophisticated security measures. Researchers from academia industry now increasingly exploit concept blockchains achieve applications. basic idea blockchain that data generated by users or past are verified for correctness cannot be...
We propose a novel Attentional Scale Sequence Fusion based You Only Look Once (YOLO) framework (ASF-YOLO) which combines spatial and scale features for accurate fast cell instance segmentation. Built on the YOLO segmentation framework, we employ Feature (SSFF) module to enhance multiscale information extraction capability of network, Triple Encoder (TFE) fuse feature maps different scales increase detailed information. further introduce Channel Position Attention Mechanism (CPAM) integrate...
Brain functional connectivity (FC) networks inferred from magnetic resonance imaging (fMRI) have shown altered or aberrant brain connectome in various neuropsychiatric disorders. Recent application of deep neural to connectome-based classification mostly relies on traditional convolutional (CNNs) using input FCs a regular Euclidean grid learn spatial maps neglecting the topological information networks, leading potentially sub-optimal performance disorder identification. We propose novel...
Facial expression recognition forms a critical capability desired by human-interacting systems that aim to be responsive variations in the human's emotional state. Recent trends toward cloud computing and outsourcing has led requirement for facial performed remotely potentially untrusted servers. This paper presents system addresses challenge of performing when test image is encrypted domain. More specifically, best our knowledge, this first known result performs Such solves problem needing...
Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads the requirement for data classification be performed by potentially untrusted servers in cloud. Within this context, classifier built server can utilized order classify their own samples over In paper, we study a privacy-preserving (PP) technique where is unable learn any knowledge about clients' input while side also...
Since RFID tags are ubiquitous and at times even oblivious to the human user, all modern protocols designed resist tracking so that location privacy of user is not violated. Another design criterion for RFIDs low computational effort required tags, in view most passive devices derive power from an reader's signals. Along this vein, a class ultralightweight authentication has been designed, which uses only basic bitwise arithmetic operations like exclusive-OR, OR, addition, rotation, forth....
Micro-expression recognition is still in the preliminary stage, owing much to numerous difficulties faced development of datasets. Since micro-expression an important affective clue for clinical diagnosis and deceit analysis, effort has gone into creation these datasets research purposes. There are currently two publicly available spontaneous datasets--SMIC CASME II, both with baseline results released using widely used dynamic texture descriptor LBP-TOP feature extraction. Although popular...
Micro-expressions are spontaneous, brief and subtle facial muscle movements that exposes underlying emotions. Motivated by recent exploits into deep learning for micro-expression analysis, we propose a lightweight dual-stream shallow network in the form of pair truncated CNNs with heterogeneous input features. The merging convolutional features allows discriminative classes stemming from both streams. Using activation heatmaps, further demonstrate salient areas well emphasized, correspond...
Micro-expression usually occurs at high-stakes situations and may provide useful information in the field of behavioral psychology for better interpretion analysis. Unfortunately, it is technically challenging to detect recognize micro-expressions due its brief duration subtle facial distortions. Apex frame, which instant indicating most expressive emotional state a video, effective classify emotion that particular frame. In this work, we present novel method spot apex frame spontaneous...
A clinical decision support system forms a critical capability to link health observations with knowledge influence choices by clinicians for improved healthcare. Recent trends toward remote outsourcing can be exploited provide efficient and accurate in In this scenario, use the located servers via Internet diagnose their patients. However, fact that these are third party therefore potentially not fully trusted raises possible privacy concerns. paper, we propose novel privacy-preserving...
Spontaneous subtle emotions are expressed through micro-expressions, which tiny, sudden and short-lived dynamics of facial muscles; thus poses a great challenge for visual recognition. The abrupt but significant the recognition task temporally sparse while rest, irrelevant dynamics, redundant. In this work, we analyze enforce sparsity constrains to learn temporal spectral structures eliminate would ease in spontaneous emotions. hypothesis is confirmed experimental results automatic emotion...