| 2025 |
Uhongora, U., Thinyane, M., & Law, Y. W. (2025). Development of an SDN-based Space System Simulation Framework for Intrusion Detection. In Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience Csr 2025 (pp. 524-529). US: IEEE. DOI |
| 2024 |
Doss, R., Ranasinghe, D., Paik, H., Pal, S., Pan, L., Zia, T., . . . Venkataraman, N. (2024). SPT-IoT 2024: 7th International Workshop on Security, Privacy and Trust in the Internet of Things - Welcome and Committees. In 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2024 (pp. 46-47). US: IEEE. DOI |
| 2023 |
Law, Y. W., Gliponeo, J. J., Singh, D., McGuire, J., Liang, J., Ho, S. Y., & Slay, J. (2023). Detecting and tracking hypersonic glide vehicles: a cybersecurity-engineering analysis of academic literature. In R. L. Curran (Ed.), Proceedings of the 18th International Conference on Cyber Warfare and Security Vol. 18 (pp. 189-198). UK: Academic Conferences International Limited. DOI WoS3 |
| 2023 |
Law, Y. W., Qiao, Y., Chow, C., Marian, R., Gorjian Jolfaei, N., Gorjian, N., & Pan, J. S. (2023). Diagnosing rolling-element bearing faults in the real world: problem solved?. In Proceedings of the IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society (pp. 1-6). US: IEEE. DOI |
| 2023 |
Uhongora, U., Mulinde, R., Law, Y. W., & Slay, J. (2023). Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems. In European Conference on Information Warfare and Security Eccws Vol. 2023-June (pp. 639-647). UK: Academic Conferences and Publishing International Ltd. DOI Scopus7 |
| 2023 |
Edwards, A., Law, Y. W., Mulinde, R., & Slay, J. (2023). Evaluation of Quantum Key Distribution for Secure Satellite-integrated IoT Networks. In R. L. Wilson, & M. B. Curran (Eds.), PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS Vol. 18 (pp. 67-76). UK: ACAD CONFERENCES LTD. DOI WoS2 |
| 2022 |
Law, Y. W., & Slay, J. (2022). SIEM4GS: Security Information and Event Management for a Virtual Ground Station Testbed. In European Conference on Information Warfare and Security Eccws Vol. 2022-June (pp. 150-159). Academic Conferences and Publishing International Ltd. DOI |
| 2022 |
Du, A., Chen, B., Chin, T. J., Law, Y. W., Sasdelli, M., Raja Segaran, R., & Campbell, D. (2022). Physical Adversarial Attacks on an Aerial Imagery Object Detector. In Proceedings 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV 2022) (pp. 3798-3808). Online: IEEE. DOI Scopus73 WoS43 |
| 2022 |
Du, A., Law, Y. W., Sasdelli, M., Chen, B., Clarke, K., Brown, M., & Chin, T. J. (2022). Adversarial attacks against a satellite-borne multispectral cloud detector. In International Conference on Digital Image Computing: Techniques and Applications Vol. abs/2112.01723 (pp. 1-8). US: IEEE. DOI Scopus3 |
| 2022 |
Du, A., Chen, B., Chin, T. -J., Law, Y. W., Sasdelli, M., Rajasegaran, R., & Campbell, D. (2022). Physical Adversarial Attacks on an Aerial Imagery Object Detector.. In WACV (pp. 3798-3808). IEEE. |
| 2022 |
Law, Y. W., & Slay, J. (2022). SIEM4GS: Security information and event management for a virtual ground station testbed. In T. Eze, N. Khan, & C. Onwubiko (Eds.), Proceedings of the 21st European Conference on Cyber Warfare and Security Vol. 21 (pp. 150-159). UK: Academic Conferences International Limited. |
| 2020 |
Li, J., Dogancay, K., Nguyen, N. H., & Wei Law, Y. (2020). Drss-Based Localisation Using Weighted Instrumental Variables and Selective Power Measurement. In ICASSP IEEE International Conference on Acoustics Speech and Signal Processing Proceedings Vol. 2020-May (pp. 4876-4880). US: IEEE. DOI Scopus6 WoS3 |
| 2020 |
Lyu, L., Law, Y. W., Siong Ng, K., Xue, S., Zhao, J., Yang, M., & Liu, L. (2020). Towards Distributed Privacy-Preserving Prediction. In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC) Vol. 2020-October (pp. 4179-4184). US: IEEE. DOI Scopus6 WoS6 |
| 2019 |
Li, J., Dogancay, K., Nguyen, N. H., & Law, Y. W. (2019). Reducing the bias in DRSS-based localization: an instrumental variable approach. In European Signal Processing Conference Vol. 2019-September (pp. 1-5). US: IEEE. DOI Scopus6 WoS6 |
| 2019 |
Perera, A. G., Law, Y. W., & Chahl, J. (2019). Cross-correlation-based robust object tracking in aerial videos. In AIAC18: 18th Australian International Aerospace Congress (2019): HUMS - 11th Defence Science and Technology (DST) International Conference on Health and Usage Monitoring (HUMS 2019): ISSFD - 27th International Symposium on Space Flight Dynamics (ISSFD) (pp. 222-228). Australia: Engineers Australia. |
| 2018 |
Perera, A. G., Al-Naji, A., Law, Y. W., & Chahl, J. (2018). Human Detection and Motion Analysis from a Quadrotor UAV. In Iop Conference Series Materials Science and Engineering Vol. 405 (pp. 11 pages). UK: IOP PUBLISHING LTD. DOI Scopus18 WoS10 |
| 2017 |
Lyu, L., Law, Y. W., Jin, J., & Palaniswami, M. (2017). Privacy-preserving aggregation of smart metering via transformation and encryption. In Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 (pp. 472-479). US: IEEE. DOI Scopus15 WoS11 |
| 2017 |
Lyu, L., He, X., Law, Y. W., & Palaniswami, M. (2017). Privacy-preserving collaborative deep learning with application to human activity recognition. In CIKM '17: proceedings of the Conference on Information and Knowledge Management Vol. Part F131841 (pp. 1219-1228). US: ACM. DOI Scopus69 WoS55 |
| 2016 |
Lyu, L., Law, Y. W., Erfani, S. M., Leckie, C., & Palaniswami, M. (2016). An improved scheme for privacy-preserving collaborative anomaly detection. In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016 (pp. 1-6). US: IEEE. DOI Scopus13 |
| 2014 |
Erfani, S. M., Law, Y. W., Karunasekera, S., Leckie, C. A., & Palaniswami, M. (2014). Privacy-preserving collaborative anomaly detection for participatory sensing. In V. S. Teng (Ed.), Advances in Knowledge Discovery and Data Mining: 18th Pacific-Asia Conference, PAKDD 2014, Tainan, Taiwan, May 13-16, 2014. Proceedings, Part I Vol. 8443 LNAI (pp. 581-593). Switzerland: Springer. DOI Scopus9 |
| 2014 |
Ning, B., Jin, J., Zheng, J., & Law, Y. W. (2014). Connectivity control and performance optimization in Wireless Robotic Networks : issues, approached and a new framework. In Proceedings of 2014 International Conference on Modelling, Identification & Control (pp. 142-148). US: IEEE Press. DOI Scopus3 WoS1 |
| 2013 |
Law, Y. W., Gong, Z., Luo, T., Marusic, S., & Palaniswami, M. (2013). Comparative study of multicast authentication schemes with application to wide-area measurement system. In 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013 (pp. 287-298). United States: ACM. DOI Scopus11 |
| 2013 |
Gubbi, J., Marusic, S., Rao, A. S., Law, Y. W., & Palaniswami, M. (2013). A pilot study of urban noise monitoring architecture using wireless sensor networks. In 2013 2nd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013 (pp. 1047-1052). US: IEEE. DOI Scopus26 WoS12 |
| 2013 |
Li, J., Li, S., Zhang, Y., Law, Y. W., Zhou, X., & Palaniswami, M. (2013). Analytical model of coding-based reprogramming protocols in lossy wireless sensor networks. In 2013 IEEE International Conference on Communications, ICC 2013; Budapest; Hungary (pp. 1867-1871). United States: IEEE. DOI Scopus8 WoS5 |
| 2013 |
Hollick, M., Kanhere, S., Boavida, F., Boulis, A., Brown, J., Christin, D., . . . X, X. (2013). Welcome message from the SenseApp 2013 chairs. In Proceedings Conference on Local Computer Networks LCN (pp. lvii-lviii). IEEE. DOI |
| 2012 |
Luo, T., Tan, H., Quan, P., Law, Y. W., & Jin, J. (2012). Enhancing responsiveness and scalability for OpenFlow networks via control-message quenching. In International conference on ICT convergence : global open innovation summit for smart ICT convergence", ICTC 2012 (pp. 348-353). US: IEEE. DOI Scopus21 |
| 2012 |
Law, Y. W., Alpcan, T., Lee, V., Lo, A., Marusic, S., & Palaniswami, M. (2012). Demand response architectures and load management algorithms for energy-efficient power grids : a survey. In V. C. S. Lee, & K. L. Ong (Eds.), 7th International Conference on Knowledge, Information and Creativity Support Systems, KICSS 2012 (pp. 134-141). US: IEEE Press. DOI Scopus69 WoS43 |
| 2012 |
Law, Y. W., Alpcan, T., Palaniswami, M., & Dey, S. (2012). Security games and risk minimization for automatic generation control in smart grid. In J. Walrand, & J. Grossklags (Eds.), GameSec 2012: Decision and Game Theory for Security proceedings Vol. 7638 LNCS (pp. 281-295). Germany: Springer. DOI Scopus11 |
| 2012 |
Law, Y. W., Alpcan, T., & Palaniswami, M. (2012). Security games for voltage control in smart grid. In 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012 (pp. 212-219). US: IEEE. DOI Scopus17 WoS10 |
| 2012 |
Gong, Z., Nikova, S., & Law, Y. W. (2012). KLEIN : a new family of lightweight block ciphers. In A. Juels, & C. Paar (Eds.), RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers Vol. 7055 LNCS (pp. 1-18). Germany: Springer. DOI Scopus260 WoS209 |
| 2011 |
Gong, Z., Qiang, T., Law, Y. W., & Chen, H. (2011). KALwEN+: practical key management schemes for gossip-based wireless medical sensor networks. In X. J. Lai, M. Yung, & D. D. Lin (Eds.), Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers Vol. 6584 LNCS (pp. 268-283). Germany: Springer. DOI Scopus2 WoS1 |
| 2010 |
Jin, J., Law, Y. W., Palaniswami, M., & Man, Z. (2010). A unified flow control approach for QoS balance in differentiated services. In Proceedings of the 2010 IEEE International Conference on Communications, ICC 2010 (pp. 1-6). US: IEEE Press. DOI Scopus1 |
| 2010 |
Hanselmann, T., Zhang, Y., Morelande, M., Nor, M. I. M., Tan, J. W. J., Zhou, X., & Law, Y. W. (2010). Self-localization in wireless sensor networks using particle filtering with progressive correction. In International ICST Conference on Communications and Networking in China, ChinaCom 2010 (pp. 1-6). US: IEEE. DOI Scopus2 |
| 2009 |
Law, Y. W., Chatterjea, S., Jin, J., Hanselmann, T., & Palaniswami, M. (2009). Energy-efficient data acquisition by adaptive sampling for wireless sensor networks. In 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009 : Connecting the World Wirelessly (pp. 1146-1151). US: ACM. DOI Scopus29 |
| 2009 |
Munari, A., Schott, W., & Law, Y. W. (2009). Dynamic tunnel routing for reliable and resilient data forwarding in wireless sensor networks. In 2009 IEEE 20th Personal, Indoor and Mobile Radio Communications Symposium, PIMRC 2009 (pp. 1178-1182). US: IEEE Press. DOI Scopus2 WoS2 |
| 2009 |
Zhang, Y., Zhou, X., Law, Y. W., & Palaniswami, M. (2009). Insider DoS attacks on epidemic propagation strategies of network reprogramming in wireless sensor networks. In J. S. Pan, B. L. Guo, & A. Abraham (Eds.), 5th International Conference on Information Assurance and Security, IAS 2009 Vol. 2 (pp. 263-266). US: IEEE. DOI |
| 2008 |
Jin, J., Law, Y. W., Wang, W., & Palaniswami, M. (2008). A hierarchical transport architecture for wireless sensor networks. In 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2008 (pp. 145-150). US: IEEE. DOI Scopus3 WoS1 |
| 2008 |
Yen, L. H., Law, Y. W., & Palaniswami, M. (2008). Risk-aware beacon scheduling for tree-based Zigbee/IEEE 802.15.4 wireless networks. In ACM International Conference Proceeding Series. ICST. DOI Scopus9 |
| 2007 |
Law, Y. W., Yen, L. -H., Di Pietro, R., & Palaniswami, M. (2007). Secure <i>k</i>-connectivity properties of wireless sensor networks. In 2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3 (pp. 1190-+). ITALY, Pisa: IEEE. WoS1 |
| 2005 |
Law, Y. W., & Havinga, P. J. M. (2005). How to secure a wireless sensor network. In PROCEEDINGS OF THE 2005 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE (pp. 89-95). AUSTRALIA, Melbourne: IEEE. WoS18 |
| 2005 |
Law, Y. W., & Havinga, P. J. M. (2005). How to secure a wireless sensor network. In Proceedings of the 2005 Intelligent Sensors Sensor Networks and Information Processing Conference Vol. 2005 (pp. 88-95). Scopus29 |
| 2005 |
Law, Y. W., Hartel, P., Hartog, J. D., & Havinga, P. (2005). Link-layer jamming attacks on S-MAC. In E. Cayirci, S. Baydere, & P. Havinga (Eds.), Proceedings of the Second European Workshop on Wireless Sensor Networks Ewsn 2005 Vol. 2005 (pp. 217-225). TURKEY, Istanbul: IEEE. Scopus65 WoS38 |
| 2005 |
Law, Y. W., Van Hoesel, L., Doumen, J., Hartel, P., & Havinga, P. (2005). Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. In Sasn 05 Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks Vol. 2005 (pp. 76-88). ACM. DOI Scopus89 |
| 2004 |
Law, Y. W., Doumen, J., & Hartel, P. (2004). Benchmarking block ciphers for wireless sensor networks. In 2004 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (pp. 447-456). Scopus42 |
| 2003 |
Di Pietro, R., Mancini, L. V., Law, Y. W., Etalle, S., & Havinga, P. (2003). LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In C. H. Huang, & J. Ramanujam (Eds.), Proceedings of the International Conference on Parallel Processing Workshops Vol. 2003-January (pp. 397-406). TAIWAN, KAOHSIUNG: IEEE COMPUTER SOC. DOI Scopus112 WoS65 |
| 2003 |
Chong, C. N., Corin, R., Etalle, S., Hartel, P., Jonker, W., & Law, Y. W. (2003). LicenseScript: A novel digital rights language and its semantics. In K. Ng, C. Busch, & P. Nesi (Eds.), Proceedings 3rd International Conference on Web Delivering of Music Wedelmusic 2003 (pp. 122-129). ENGLAND, LEEDS: IEEE COMPUTER SOC. DOI Scopus34 WoS16 |
Available For Media Comment.