Yee Wei Law

ORCID: 0000-0002-5665-0980
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security in Wireless Sensor Networks
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Digital Rights Management and Security
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • Human Pose and Action Recognition
  • Advanced Steganography and Watermarking Techniques
  • Smart Grid Security and Resilience
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Gait Recognition and Analysis
  • Network Security and Intrusion Detection
  • Adversarial Robustness in Machine Learning
  • Opportunistic and Delay-Tolerant Networks
  • Copyright and Intellectual Property
  • Wireless Networks and Protocols
  • Hand Gesture Recognition Systems
  • Indoor and Outdoor Localization Technologies
  • Mobile Crowdsensing and Crowdsourcing
  • Distributed Sensor Networks and Detection Algorithms
  • Video Surveillance and Tracking Methods
  • Energy Harvesting in Wireless Networks
  • Infrared Target Detection Methodologies
  • Target Tracking and Data Fusion in Sensor Networks

University of South Australia
2014-2024

Multimedia University
2022

Conference Board
2021

Institute for Telecommunication Sciences
2019

The University of Melbourne
2007-2014

Northwestern Polytechnical University
2009-2011

Australian National University
2009

National University of Kaohsiung
2008

University of Twente
2003-2006

Delft University of Technology
2005

Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing most storage- and energy-efficient block cipher is essential, due to facts that these are meant operate without human intervention for a long period time with little energy supply, available storage scarce on nodes. However, our knowledge, no systematic work has been done this area so far. We construct evaluation framework which we first identify candidates ciphers...

10.1145/1138127.1138130 article EN ACM Transactions on Sensor Networks 2006-02-01

A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting packets may help to prevent jammer from taking actions based on content packets, but temporal arrangement induced nature protocol might unravel patterns that take advantage of, even when are encrypted. By looking at packet interarrival times in three representative MAC protocols, S-MAC,...

10.1145/1464420.1464426 article EN ACM Transactions on Sensor Networks 2009-02-01

The power grid is a critical infrastructure that must be protected against potential threats. While modern technologies at the center of ongoing smart evolution increase its operational efficiency, they also make it more susceptible to malicious attacks such as false data injection electronic monitoring systems. This paper presents game-theoretic approach security by combining quantitative risk management techniques with decision making on protective measures. consequences are quantified...

10.1109/tpwrs.2014.2326403 article EN IEEE Transactions on Power Systems 2014-06-02

Deep neural networks (DNNs) have become essential for processing the vast amounts of aerial imagery collected using earth-observing satellite platforms. However, DNNs are vulnerable towards adversarial examples, and it is expected that this weakness also plagues imagery. In work, we demonstrate one first efforts on physical attacks imagery, whereby patches were optimised, fabricated installed or near target objects (cars) to significantly reduce efficacy an object detector applied overhead...

10.1109/wacv51458.2022.00385 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2022-01-01

In this paper, we present a mechanism for securing group communications in Wireless Sensor Networks (WSN). First, derive an extension of logical key hierarchy (LKH). Then merge the with directed diffusion. The resulting protocol, LKHW, combines advantages both LKH and diffusion: robustness routing, security from tried tested concepts secure multicast. particular, LKHW enforces backward forward secrecy, while incurring energy cost that scales roughly logarithmically size. This is first...

10.1109/icppw.2003.1240395 article EN 2004-03-02

A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting packets may help prevent jammer from taking actions based on content packets, but temporal arrangement induced nature protocol might unravel patterns that take advantage even when are encrypted. By looking at packet interarrival times in three representative MAC protocols, S-MAC, LMAC and...

10.1145/1102219.1102234 article EN 2005-11-07

The proliferation of wearable devices has contributed to the emergence mobile crowdsensing, which leverages power crowd collect and report data a third party for large-scale sensing collaborative learning. However, since may not be honest, privacy poses major concern. In this paper, we address concern with two-stage privacy-preserving scheme called RG-RP: first stage is designed mitigate maximum posteriori (MAP) estimation attacks by perturbing each participant's through nonlinear function...

10.1145/3132847.3132990 article EN 2017-11-06

A machine-to-machine (M2M) communications system is a large-scale network with diverse applications and massive number of interconnected heterogeneous machines (e.g., sensors, vending vehicles). Cellular wireless technologies will be potential candidate for providing the last mile M2M connectivity. Thus, Third Generation Partnership Project (3GPP) IEEE 802.16p, have both specified an overall cellular reference architecture. The European Telecommunications Standards Institute (ETSI), in...

10.1109/mwc.2013.6664485 article EN IEEE Wireless Communications 2013-10-01

Aerial human action recognition is an emerging topic in drone applications. Commercial platforms capable of detecting basic actions such as hand gestures have been developed. However, a limited number aerial video datasets are available to support increased research into analysis. Most the confined indoor scenes or object tracking and many outdoor do not sufficient body details apply state-of-the-art machine learning techniques. To fill this gap enable wider application areas, we present...

10.3390/drones3040082 article EN cc-by Drones 2019-11-28

A wide-area measurement system (WAMS) is a that provides time-synchronized view of electrical conditions over large geographical area, thereby enhancing the situational awareness energy management power grid. With this enhanced awareness, utilities would be able to react promptly contingencies, and prevent large-scale blackouts. To secure WAMS communications, we propose key (WAKE), comprehensive scheme targeting concrete set security objectives derived from NIST's impact level ratings. For...

10.1109/mcom.2013.6400436 article EN IEEE Communications Magazine 2013-01-01

A power grid has four segments: generation, transmission, distribution and demand. Until now, utilities have been focusing on streamlining their transmission operations for energy efficiency. While loads traditionally a passive part of grid, with rapid advances in ICT, demand-side technologies now play an increasingly important role the efficiency grids. This paper starts by introducing key concepts management load management. Classical defines six shape objectives, which "peak clipping"...

10.1109/kicss.2012.45 article EN 2012-11-01

We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio is. By exploiting the semantics of protocol (aka MAC protocol), an attacker can achieve better efficiency blindly signals alone. In this paper, we investigate some attacks on S-MAC, level effectiveness and potentially countermeasure be implemented against one these attacks.

10.1109/ewsn.2005.1462013 article EN 2005-07-19

Advancements in deep neural networks have contributed to near perfect results for many computer vision problems such as object recognition, face recognition and pose estimation. However, human action is still far from human-level performance. Owing the articulated nature of body, it challenging detect an multiple viewpoints, particularly aerial viewpoint. This further compounded by a scarcity datasets that cover viewpoints actions. To fill this gap enable research wider application areas, we...

10.1109/thms.2020.2971958 article EN IEEE Transactions on Human-Machine Systems 2020-02-20

The security of wireless sensor networks (WSNs) is a complex issue. While research WSNs progressing at tremendous pace, and many techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits pieces together ease implementors' adoption technologies. We answer challenge by proposing guidelines according which WSN can be implemented in practice.

10.1109/issnip.2005.1595561 article EN International Conference on Intelligent Sensors, Sensor Networks and Information Processing 2005-01-01

The energy efficiency requirement of wireless sensor networks (WSN) is especially high because the nodes are meant to operate without human intervention for a long period time with little supply. Besides, available storage scarce due their small physical size. Therefore choosing most storage- and energy-efficient block cipher WSN important. However our knowledge so far no systematic work has been conducted in this area. We have identified candidates ciphers suitable based on existing...

10.1109/mahss.2004.1392185 article EN 2005-02-22

We propose LicenseScript as a new multiset rewriting/logic based language for expressing dynamic conditions of use digital assets such music, video or private data. differs from other rights expression languages in that it caters the intentional but legal manipulation believe this feature is answer to providing flexibility needed support emerging usage paradigms provide with simple semantics on traces.

10.1109/wdm.2003.1233885 article EN 2004-03-22

Wireless sensor networks (WSNs) are well suited for environment monitoring. However, some highly specialized sensors (e.g. hydrological sensors) have high power demand, and without due care, they can exhaust the battery supply quickly. Taking measurements with this kind of also overwhelm communication resources by far. One way to reduce drawn these high-demand is adaptive sampling, i.e., skip sampling when data loss estimated be low. Here, we present an algorithm based on Box-Jenkins...

10.1145/1582379.1582631 article EN 2009-06-21

A network reprogramming protocol is made for updating the firmware of a wireless sensor (WSN) in situ. For security reasons, every update must be authenticated to prevent an attacker from installing its code network. While existing schemes can provide authentication services, they are insufficient new generation coding-based protocols like Rateless Deluge. We propose Secure Deluge or Sreluge, secure version that resistant pollution attacks (denial-of-service aimed at polluting encoded...

10.1155/2011/685219 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2010-08-04

The advent of satellite-borne machine learning hardware accelerators has enabled the onboard processing payload data using techniques such as convolutional neural networks (CNNs). A notable example is a CNN to detect presence clouds in multispectral captured on Earth observation (EO) missions, whereby only clear sky are downlinked conserve bandwidth. However, prior deployment, new missions that employ sensors will not have enough representative datasets train model, while model trained...

10.3390/rs16183469 article EN cc-by Remote Sensing 2024-09-18

Internet of Things (IoT) is denned as interconnection sensing and actuating devices providing the ability to share information across platforms through a unified framework, developing common operating picture for enabling innovative applications. As world urban population set cross unprecedented levels, adequate provision services infrastructure poses huge challenges. The emerging IoT that offers ubiquitous actuation can be utilized effectively managing environments. In this paper, new...

10.1109/icacci.2013.6637321 article EN 2013-08-01
Coming Soon ...