Yee Wei Law

Teaching Strengths

Computational thinking
Model-based design using MATLAB/Simulink
Model-based systems engineering using 3DEXPERIENCE

Dr Yee Wei Law

Senior Lecturer

School of Electrical and Mechanical Engineering

College of Engineering and Information Technology

Eligible to supervise Masters and PhD - email supervisor to discuss availability.

Available For Media Comment.


I (“Law”) received my BEng, MEng and PhD degrees from University of Southampton, Nanyang Technological University, and University of Twente respectively. Before joining UniSA, I was a Research Fellow at the Department of Electrical and Electronic Engineering, The University of Melbourne.
Research: My research interests are diverse, but I am currently focusing on adversarial machine learning, space system cybersecurity, as well as machine diagnostics and prognostics. I was involved with numerous European projects on sensor networks, including EYES, SENSEI, Internet of Things Initiative, SmartSantander and SocIoTal; in particular, I was a Chief Investigator in the last three projects. In Australia, I was involved with ARC-funded sensor network and smart city testbed projects. I am serving on the editorial board for International Journal of Distributed Sensor Networks and Journal of Computer Security and Data Forensics. My publications can be found in ACM Transactions, IEEE Transactions, IEEE Magazines, EURASIP Journals and more, earning me a Google Scholar H-index of 26.
Teaching: From 2017 to 2021, I was the Program Director for multiple electrical-related BEng (Hons) programs, namely Electrical and Electronic Engineering (ESE-LHIF), Electrical and Mechatronic Engineering (EMC-LHIF), Electrical and Electronic Engineering + Business (LBZB), and Mechatronic Engineering (LHEG).
Before 2021, I coordinated and taught EEET 3046 Control Systems and EEET 4071 Advanced Control. From 2020 to 2021, I coordinated and taught EEET 2044 Electromechanics. Since 2021, I have been coordinating and teaching EEET 3016 Power Electronics. Since 2022-2023, I have been coordinating and teaching COMP 5074 Cryptography and Data Protection and COMP 5075 Telecommunications and Device Security as well. I maintain the Cyber Engineering Knowledge Base at UniSA.

  • Adversarial machine learning
  • Cybersecurity of space systems
  • Machine diagnostics and prognostics
  • Security and privacy aspects of the Internet of Things
  • Privacy-preserving data mining for participatory sensing or collaborative learning (an emerging data crowdsourcing paradigm)
  • Secure multihop over-the-air reprogramming of wireless sensor devices using rateless codes
  • Smart grid
  • Game-theoretic modeling of security attacks and defences for optimal resource allocation
  • Technologies for increasing the energy efficiency of power systems
  • Distributed algorithms for wireless sensor networks
  • Energy-efficient adaptive sampling for network lifetime maximization

Year Citation
2025 Xu, Z., Chow, C. W. K., Rahman, M. M., Rameezdeen, R., & Law, Y. W. (2025). Remaining Useful Life Prediction for Bearings Across Domains via a Subdomain Adaptation Network Driven by Spectral Clustering. Sensors, 25(22), 26 pages.
DOI
2025 Xu, Z., Chow, C. W. K., Rahman, M. M., Rameezdeen, R., & Law, Y. W. (2025). Remaining Useful Life Prediction Across Conditions Based on a Health Indicator-Weighted Subdomain Alignment Network. Sensors, 25(15), 26 pages.
DOI Scopus1 WoS2 Europe PMC1
2025 Xu, Z., Law, Y. W., Rahman, M. M., Rameezdeen, R., & Chow, C. W. K. (2025). Remaining useful life prediction based on a subdomain adaptation and contextual information compensation network. Knowledge Based Systems, 325(113841), 17 pages.
DOI Scopus1 WoS1
2024 Du, A., Doan, A. -D., Law, Y. W., & Chin, T. -J. (2024). Domain Adaptation for Satellite-Borne Multispectral Cloud Detection. Remote Sensing, 16(18), 3469.
DOI Scopus2 WoS2
2023 Du, A., Doan, A. -D., Law, Y. W., & Chin, T. -J. (2023). Domain Adaptation for Satellite-Borne Hyperspectral Cloud Detection.
2022 McGuire, J. L., Law, Y. W., Doğançay, K., Ho, S. Y., & Chahl, J. (2022). Optimal Maneuvering for Autonomous Vehicle Self-Localization. Entropy, 24(8), 19 pages.
DOI Scopus9 WoS6 Europe PMC1
2021 Du, A., Chen, B., Chin, T. -J., Law, Y. W., Sasdelli, M., Rajasegaran, R., & Campbell, D. (2021). Physical Adversarial Attacks on an Aerial Imagery Object Detector.. CoRR, abs/2108.11765.
2021 Du, A., Law, Y. W., Sasdelli, M., Chen, B., Clarke, K., Brown, M., & Chin, T. -J. (2021). Adversarial Attacks against a Satellite-borne Multispectral Cloud
Detector.
2021 McGuire, J., Law, Y. W., Chahl, J., & Doğançay, K. (2021). Optimal beacon placement for self-localization using three beacon bearings. Symmetry, 13(1), 1-14.
DOI Scopus7 WoS3
2020 Perera, A. G., Law, Y. W., Ogunwa, T. T., & Chahl, J. (2020). A Multiviewpoint Outdoor Dataset for Human Action Recognition. IEEE Transactions on Human Machine Systems, 50(5), 405-413.
DOI Scopus51 WoS37
2020 Nasimi, F., Khayyambashi, M. R., Movahhedinia, N., & Law, Y. W. (2020). Exploiting similar prior knowledge for compressing ECG signals. Biomedical Signal Processing and Control, 60(101960), 1-13.
DOI Scopus14 WoS8
2019 Perera, A. G., Law, Y. W., & Chahl, J. (2019). Drone-action: An outdoor recorded drone video dataset for action recognition. Drones, 3(4), 1-16.
DOI Scopus76 WoS60
2018 Perera, A. G., Law, Y. W., & Chahl, J. (2018). Human Pose and Path Estimation from Aerial Video Using Dynamic Classifier Selection. Cognitive Computation, 10(6), 1019-1041.
DOI Scopus17 WoS16
2018 Perera, A. G., Law, Y. W., Al-Naji, A., & Chahl, J. (2018). Human motion analysis from UAV video. International Journal of Intelligent Unmanned Systems, 6(2), 69-92.
DOI Scopus4 WoS3
2018 Lyu, L., Bezdek, J. C., Law, Y. W., He, X., & Palaniswami, M. (2018). Privacy-preserving collaborative fuzzy clustering. Data and knowledge engineering, 116, 21-41.
DOI Scopus26 WoS16
2017 Li, J. W., Li, S. N., Zhang, Y., Gu, T., Law, Y. W., Yang, Z., . . . Palaniswami, M. (2017). An analytical model for coding-based reprogramming protocols in lossy wireless sensor networks. IEEE Transactions on Computers, 66(1), 24-37.
DOI Scopus8 WoS8
2015 Law, Y. W., Alpcan, T., & Palaniswami, M. (2015). Security games for risk minimization in automatic generation control. IEEE Transactions on Power Systems, 30(1), 223-232.
DOI Scopus103 WoS81
2014 Marusic, S., Gubbi, J., Sullivan, H., Lawand, Y. W., & Palaniswami, M. (2014). Participatory sensing, privacy, and trust management for interactive local government. IEEE Technology and Society Magazine, 33(3), 62-70.
DOI WoS2
2014 Law, Y. W., Pota, H. R., Jin, J., Man, Z., & Palaniswami, M. (2014). Control and communication techniques for the smart grid: An energy efficiency perspective. IFAC Proceedings Volumes IFAC Papersonline, 19(3), 987-998.
DOI Scopus9
2013 Lo, A., Law, Y., & Jacobsson, M. (2013). A cellular-centric service architecture for machine-to-machine (M2M) communications. IEEE wireless communications, 20(5, article no. 6664485), 143-151.
DOI Scopus68 WoS58
2013 Law, Y. W., Palaniswami, M., Kounga, G., & Lo, A. (2013). WAKE: Key management scheme for wide-area measurement systems in smart grid. IEEE Communications Magazine, 51(1), 34-41.
DOI Scopus69 WoS48
2012 Yen, L. H., Law, Y. W., & Palaniswami, M. (2012). Risk-aware distributed beacon scheduling for tree-based ZigBee wireless networks. IEEE Transactions on mobile computing, 11(4), 692-703.
DOI Scopus22 WoS17
2011 Law, Y. W., Zhang, Y., Jin, J., Palaniswami, M., & Havinga, P. (2011). Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks. EURASIP journal on wireless communications and networking, 2011(685219), 1-22.
DOI Scopus29 WoS20
2011 Zhang, Y., Zhou, X., Law, Y. W., & Palaniswami, M. (2011). A pollution-resistant method for reprogramming (PRMR) in wireless sensor networks. Xibei Gongye Daxue Xuebao, 29(3), 443-448.
2011 Zhang, Y., Zhou, X. S., Law, Y. W., & Palaniswami, M. (2011). A Secure Method for Network Coding-based Reprogramming Protocols in Wireless Sensor Networks. International Journal of Computer Network and Information Security, 3(2), 34-40.
DOI
2011 Law, Y. W., Moniava, G., Gong, Z., Hartel, P., & Palaniswami, M. (2011). KALwEN: A new practical and interoperable key management scheme for body sensor networks. Security and Communication Networks, 4(11), 1309-1329.
DOI Scopus15 WoS14
2009 Law, Y. W., Palaniswami, M., Hoesel, L., Doumen, J., Hartel, P., & Havinga, P. (2009). Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Transactions on Sensor Networks, 5(1, article no. 6), 1-38.
DOI Scopus138 WoS101
2006 Law, Y. W., Doumen, J., & Hartel, P. (2006). Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks, 2(1), 65-93.
DOI Scopus213 WoS110
2006 Chong, C. N., Corin, R., Doumen, J., Etalle, S., Hartel, P., Law, Y. W., & Tokmakoff, A. (2006). LicenseScript: A logical language for digital rights management. Annales Des Telecommunications Annals of Telecommunications, 61(3-4), 284-331.
DOI Scopus8 WoS2
2003 Chong, C. N., Etalle, S., Hartel, P. H., & Law, Y. W. (2003). Approximating fair use in LicenseScript. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 2911, 432-443.
DOI Scopus2
2003 Law, Y. W., Corin, R., Etalle, S., & Hartel, P. H. (2003). A formally verified decentralized key management architecture for wireless sensor networks. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 2775, 27-39.
DOI Scopus24 WoS18

Year Citation
2003 Law, Y. W., Etalle, S., & Hartel, P. H. (2003). Assessing security in energyefficient sensor networks (Vol. 122). D. Gritzalis, S. D. DiVimercati, P. Samarati, & S. Katsikas (Eds.), KLUWER ACADEMIC PUBLISHERS.
DOI Scopus16

Year Citation
2025 Uhongora, U., Thinyane, M., & Law, Y. W. (2025). Development of an SDN-based Space System Simulation Framework for Intrusion Detection. In Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience Csr 2025 (pp. 524-529). US: IEEE.
DOI
2024 Doss, R., Ranasinghe, D., Paik, H., Pal, S., Pan, L., Zia, T., . . . Venkataraman, N. (2024). SPT-IoT 2024: 7th International Workshop on Security, Privacy and Trust in the Internet of Things - Welcome and Committees. In 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2024 (pp. 46-47). US: IEEE.
DOI
2023 Law, Y. W., Gliponeo, J. J., Singh, D., McGuire, J., Liang, J., Ho, S. Y., & Slay, J. (2023). Detecting and tracking hypersonic glide vehicles: a cybersecurity-engineering analysis of academic literature. In R. L. Curran (Ed.), Proceedings of the 18th International Conference on Cyber Warfare and Security Vol. 18 (pp. 189-198). UK: Academic Conferences International Limited.
DOI WoS3
2023 Law, Y. W., Qiao, Y., Chow, C., Marian, R., Gorjian Jolfaei, N., Gorjian, N., & Pan, J. S. (2023). Diagnosing rolling-element bearing faults in the real world: problem solved?. In Proceedings of the IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society (pp. 1-6). US: IEEE.
DOI
2023 Uhongora, U., Mulinde, R., Law, Y. W., & Slay, J. (2023). Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems. In European Conference on Information Warfare and Security Eccws Vol. 2023-June (pp. 639-647). UK: Academic Conferences and Publishing International Ltd.
DOI Scopus7
2023 Edwards, A., Law, Y. W., Mulinde, R., & Slay, J. (2023). Evaluation of Quantum Key Distribution for Secure Satellite-integrated IoT Networks. In R. L. Wilson, & M. B. Curran (Eds.), PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS Vol. 18 (pp. 67-76). UK: ACAD CONFERENCES LTD.
DOI WoS2
2022 Law, Y. W., & Slay, J. (2022). SIEM4GS: Security Information and Event Management for a Virtual Ground Station Testbed. In European Conference on Information Warfare and Security Eccws Vol. 2022-June (pp. 150-159). Academic Conferences and Publishing International Ltd.
DOI
2022 Du, A., Chen, B., Chin, T. J., Law, Y. W., Sasdelli, M., Raja Segaran, R., & Campbell, D. (2022). Physical Adversarial Attacks on an Aerial Imagery Object Detector. In Proceedings 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV 2022) (pp. 3798-3808). Online: IEEE.
DOI Scopus73 WoS43
2022 Du, A., Law, Y. W., Sasdelli, M., Chen, B., Clarke, K., Brown, M., & Chin, T. J. (2022). Adversarial attacks against a satellite-borne multispectral cloud detector. In International Conference on Digital Image Computing: Techniques and Applications Vol. abs/2112.01723 (pp. 1-8). US: IEEE.
DOI Scopus3
2022 Du, A., Chen, B., Chin, T. -J., Law, Y. W., Sasdelli, M., Rajasegaran, R., & Campbell, D. (2022). Physical Adversarial Attacks on an Aerial Imagery Object Detector.. In WACV (pp. 3798-3808). IEEE.
2022 Law, Y. W., & Slay, J. (2022). SIEM4GS: Security information and event management for a virtual ground station testbed. In T. Eze, N. Khan, & C. Onwubiko (Eds.), Proceedings of the 21st European Conference on Cyber Warfare and Security Vol. 21 (pp. 150-159). UK: Academic Conferences International Limited.
2020 Li, J., Dogancay, K., Nguyen, N. H., & Wei Law, Y. (2020). Drss-Based Localisation Using Weighted Instrumental Variables and Selective Power Measurement. In ICASSP IEEE International Conference on Acoustics Speech and Signal Processing Proceedings Vol. 2020-May (pp. 4876-4880). US: IEEE.
DOI Scopus6 WoS3
2020 Lyu, L., Law, Y. W., Siong Ng, K., Xue, S., Zhao, J., Yang, M., & Liu, L. (2020). Towards Distributed Privacy-Preserving Prediction. In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC) Vol. 2020-October (pp. 4179-4184). US: IEEE.
DOI Scopus6 WoS6
2019 Li, J., Dogancay, K., Nguyen, N. H., & Law, Y. W. (2019). Reducing the bias in DRSS-based localization: an instrumental variable approach. In European Signal Processing Conference Vol. 2019-September (pp. 1-5). US: IEEE.
DOI Scopus6 WoS6
2019 Perera, A. G., Law, Y. W., & Chahl, J. (2019). Cross-correlation-based robust object tracking in aerial videos. In AIAC18: 18th Australian International Aerospace Congress (2019): HUMS - 11th Defence Science and Technology (DST) International Conference on Health and Usage Monitoring (HUMS 2019): ISSFD - 27th International Symposium on Space Flight Dynamics (ISSFD) (pp. 222-228). Australia: Engineers Australia.
2018 Perera, A. G., Al-Naji, A., Law, Y. W., & Chahl, J. (2018). Human Detection and Motion Analysis from a Quadrotor UAV. In Iop Conference Series Materials Science and Engineering Vol. 405 (pp. 11 pages). UK: IOP PUBLISHING LTD.
DOI Scopus18 WoS10
2017 Lyu, L., Law, Y. W., Jin, J., & Palaniswami, M. (2017). Privacy-preserving aggregation of smart metering via transformation and encryption. In Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 (pp. 472-479). US: IEEE.
DOI Scopus15 WoS11
2017 Lyu, L., He, X., Law, Y. W., & Palaniswami, M. (2017). Privacy-preserving collaborative deep learning with application to human activity recognition. In CIKM '17: proceedings of the Conference on Information and Knowledge Management Vol. Part F131841 (pp. 1219-1228). US: ACM.
DOI Scopus69 WoS55
2016 Lyu, L., Law, Y. W., Erfani, S. M., Leckie, C., & Palaniswami, M. (2016). An improved scheme for privacy-preserving collaborative anomaly detection. In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016 (pp. 1-6). US: IEEE.
DOI Scopus13
2014 Erfani, S. M., Law, Y. W., Karunasekera, S., Leckie, C. A., & Palaniswami, M. (2014). Privacy-preserving collaborative anomaly detection for participatory sensing. In V. S. Teng (Ed.), Advances in Knowledge Discovery and Data Mining: 18th Pacific-Asia Conference, PAKDD 2014, Tainan, Taiwan, May 13-16, 2014. Proceedings, Part I Vol. 8443 LNAI (pp. 581-593). Switzerland: Springer.
DOI Scopus9
2014 Ning, B., Jin, J., Zheng, J., & Law, Y. W. (2014). Connectivity control and performance optimization in Wireless Robotic Networks : issues, approached and a new framework. In Proceedings of 2014 International Conference on Modelling, Identification & Control (pp. 142-148). US: IEEE Press.
DOI Scopus3 WoS1
2013 Law, Y. W., Gong, Z., Luo, T., Marusic, S., & Palaniswami, M. (2013). Comparative study of multicast authentication schemes with application to wide-area measurement system. In 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013 (pp. 287-298). United States: ACM.
DOI Scopus11
2013 Gubbi, J., Marusic, S., Rao, A. S., Law, Y. W., & Palaniswami, M. (2013). A pilot study of urban noise monitoring architecture using wireless sensor networks. In 2013 2nd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013 (pp. 1047-1052). US: IEEE.
DOI Scopus26 WoS12
2013 Li, J., Li, S., Zhang, Y., Law, Y. W., Zhou, X., & Palaniswami, M. (2013). Analytical model of coding-based reprogramming protocols in lossy wireless sensor networks. In 2013 IEEE International Conference on Communications, ICC 2013; Budapest; Hungary (pp. 1867-1871). United States: IEEE.
DOI Scopus8 WoS5
2013 Hollick, M., Kanhere, S., Boavida, F., Boulis, A., Brown, J., Christin, D., . . . X, X. (2013). Welcome message from the SenseApp 2013 chairs. In Proceedings Conference on Local Computer Networks LCN (pp. lvii-lviii). IEEE.
DOI
2012 Luo, T., Tan, H., Quan, P., Law, Y. W., & Jin, J. (2012). Enhancing responsiveness and scalability for OpenFlow networks via control-message quenching. In International conference on ICT convergence : global open innovation summit for smart ICT convergence", ICTC 2012 (pp. 348-353). US: IEEE.
DOI Scopus21
2012 Law, Y. W., Alpcan, T., Lee, V., Lo, A., Marusic, S., & Palaniswami, M. (2012). Demand response architectures and load management algorithms for energy-efficient power grids : a survey. In V. C. S. Lee, & K. L. Ong (Eds.), 7th International Conference on Knowledge, Information and Creativity Support Systems, KICSS 2012 (pp. 134-141). US: IEEE Press.
DOI Scopus69 WoS43
2012 Law, Y. W., Alpcan, T., Palaniswami, M., & Dey, S. (2012). Security games and risk minimization for automatic generation control in smart grid. In J. Walrand, & J. Grossklags (Eds.), GameSec 2012: Decision and Game Theory for Security proceedings Vol. 7638 LNCS (pp. 281-295). Germany: Springer.
DOI Scopus11
2012 Law, Y. W., Alpcan, T., & Palaniswami, M. (2012). Security games for voltage control in smart grid. In 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012 (pp. 212-219). US: IEEE.
DOI Scopus17 WoS10
2012 Gong, Z., Nikova, S., & Law, Y. W. (2012). KLEIN : a new family of lightweight block ciphers. In A. Juels, & C. Paar (Eds.), RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers Vol. 7055 LNCS (pp. 1-18). Germany: Springer.
DOI Scopus260 WoS209
2011 Gong, Z., Qiang, T., Law, Y. W., & Chen, H. (2011). KALwEN+: practical key management schemes for gossip-based wireless medical sensor networks. In X. J. Lai, M. Yung, & D. D. Lin (Eds.), Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers Vol. 6584 LNCS (pp. 268-283). Germany: Springer.
DOI Scopus2 WoS1
2010 Jin, J., Law, Y. W., Palaniswami, M., & Man, Z. (2010). A unified flow control approach for QoS balance in differentiated services. In Proceedings of the 2010 IEEE International Conference on Communications, ICC 2010 (pp. 1-6). US: IEEE Press.
DOI Scopus1
2010 Hanselmann, T., Zhang, Y., Morelande, M., Nor, M. I. M., Tan, J. W. J., Zhou, X., & Law, Y. W. (2010). Self-localization in wireless sensor networks using particle filtering with progressive correction. In International ICST Conference on Communications and Networking in China, ChinaCom 2010 (pp. 1-6). US: IEEE.
DOI Scopus2
2009 Law, Y. W., Chatterjea, S., Jin, J., Hanselmann, T., & Palaniswami, M. (2009). Energy-efficient data acquisition by adaptive sampling for wireless sensor networks. In 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009 : Connecting the World Wirelessly (pp. 1146-1151). US: ACM.
DOI Scopus29
2009 Munari, A., Schott, W., & Law, Y. W. (2009). Dynamic tunnel routing for reliable and resilient data forwarding in wireless sensor networks. In 2009 IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, PIMRC 2009 (pp. 1178-1182). US: IEEE Press.
DOI Scopus2 WoS2
2009 Zhang, Y., Zhou, X., Law, Y. W., & Palaniswami, M. (2009). Insider DoS attacks on epidemic propagation strategies of network reprogramming in wireless sensor networks. In J. S. Pan, B. L. Guo, & A. Abraham (Eds.), 5th International Conference on Information Assurance and Security, IAS 2009 Vol. 2 (pp. 263-266). US: IEEE.
DOI
2008 Jin, J., Law, Y. W., Wang, W., & Palaniswami, M. (2008). A hierarchical transport architecture for wireless sensor networks. In 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2008 (pp. 145-150). US: IEEE.
DOI Scopus3 WoS1
2008 Yen, L. H., Law, Y. W., & Palaniswami, M. (2008). Risk-aware beacon scheduling for tree-based Zigbee/IEEE 802.15.4 wireless networks. In ACM International Conference Proceeding Series. ICST.
DOI Scopus9
2007 Law, Y. W., Yen, L. -H., Di Pietro, R., & Palaniswami, M. (2007). Secure <i>k</i>-connectivity properties of wireless sensor networks. In 2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3 (pp. 1190-+). ITALY, Pisa: IEEE.
WoS1
2005 Law, Y. W., & Havinga, P. J. M. (2005). How to secure a wireless sensor network. In PROCEEDINGS OF THE 2005 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE (pp. 89-95). AUSTRALIA, Melbourne: IEEE.
WoS18
2005 Law, Y. W., & Havinga, P. J. M. (2005). How to secure a wireless sensor network. In Proceedings of the 2005 Intelligent Sensors Sensor Networks and Information Processing Conference Vol. 2005 (pp. 88-95).
Scopus29
2005 Law, Y. W., Hartel, P., Hartog, J. D., & Havinga, P. (2005). Link-layer jamming attacks on S-MAC. In E. Cayirci, S. Baydere, & P. Havinga (Eds.), Proceedings of the Second European Workshop on Wireless Sensor Networks Ewsn 2005 Vol. 2005 (pp. 217-225). TURKEY, Istanbul: IEEE.
Scopus65 WoS38
2005 Law, Y. W., Van Hoesel, L., Doumen, J., Hartel, P., & Havinga, P. (2005). Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. In Sasn 05 Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks Vol. 2005 (pp. 76-88). ACM.
DOI Scopus89
2004 Law, Y. W., Doumen, J., & Hartel, P. (2004). Benchmarking block ciphers for wireless sensor networks. In 2004 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (pp. 447-456).
Scopus42
2003 Di Pietro, R., Mancini, L. V., Law, Y. W., Etalle, S., & Havinga, P. (2003). LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In C. H. Huang, & J. Ramanujam (Eds.), Proceedings of the International Conference on Parallel Processing Workshops Vol. 2003-January (pp. 397-406). TAIWAN, KAOHSIUNG: IEEE COMPUTER SOC.
DOI Scopus112 WoS65
2003 Chong, C. N., Corin, R., Etalle, S., Hartel, P., Jonker, W., & Law, Y. W. (2003). LicenseScript: A novel digital rights language and its semantics. In K. Ng, C. Busch, & P. Nesi (Eds.), Proceedings 3rd International Conference on Web Delivering of Music Wedelmusic 2003 (pp. 122-129). ENGLAND, LEEDS: IEEE COMPUTER SOC.
DOI Scopus34 WoS16
  • Quantum-secure time transfer, CSIRO Australia, 15/10/2024 - 15/10/2027

  • Quantum secured communications for information networks in smart microgrids, Cwth Dept of Industry, Science, Energy and Resources, 01/11/2024 - 30/09/2025

  • Evolutionary development of bio-inspired flapping wing aerial vehicle for trusted autonomy, Defence Science & Technology Organisation - Business & Commercialisation Office, 01/12/2016 - 30/06/2017

Courses I teach

  • COMP 5074 Cryptography and Data Protection (2025)
  • COMP 5075 Telecommunications and Device Security (2025)
  • EEET 3016 Power Electronics (2025)
  • COMP 5074 Cryptography and Data Protection (2024)
  • EEET 3016 Power Electronics (2024)

Programs I'm associated with

  • LHIF - Bachelor of Engineering (Honours)
  • LHEG - Bachelor of Engineering (Honours)
  • LMEL - Master of Engineering

Date Role Research Topic Program Degree Type Student Load Student Name
2024 Principal Supervisor - Doctor of Philosophy Doctorate Full Time Mr Isar Lemeire
2024 Co-Supervisor - Doctor of Philosophy Doctorate Full Time Mr Jarrad Michael Knight
2023 Principal Supervisor - Doctor of Philosophy Doctorate Full Time Zhiqing Xu
2022 Co-Supervisor - Doctor of Philosophy Doctorate Full Time Mrs Uakomba Uhongora
2021 Co-Supervisor - Doctor of Philosophy Doctorate Full Time Mr David James Culpin
2021 Co-Supervisor - Doctor of Philosophy Doctorate Full Time Mr Shane Bennett

Date Role Research Topic Program Degree Type Student Load Student Name
2020 - 2025 External Supervisor Satellite-Borne Machine Learning for Earth Observation: Adversarial Robustness and Domain Gap Doctor of Philosophy Doctorate Full Time Mr Andrew Patrick Du

Connect With Me

External Profiles

Other Links