Wanli Ma
Wanli Ma
Verified email at canberra.edu.au
Title
Cited by
Cited by
Year
An overview of temporal and modal logic programming
MA Orgun, W Ma
International Conference on Temporal Logic, 445-479, 1994
1731994
Password entropy and password quality
W Ma, J Campbell, D Tran, D Kleeman
2010 Fourth International Conference on Network and System Security, 583-587, 2010
832010
Senior health monitoring using Kinect
M Parajuli, D Tran, W Ma, D Sharma
2012 Fourth International Conference on Communications and Electronics (ICCE …, 2012
762012
Using Shannon entropy as eeg signal feature for fast person identification.
DQ Phung, D Tran, W Ma, P Nguyen, T Pham
ESANN 4 (1), 413-418, 2014
562014
Impact of restrictive composition policy on user password choices
J Campbell, W Ma, D Kleeman
Behaviour & Information Technology 30 (3), 379-388, 2011
522011
Multi-factor EEG-based user authentication
T Pham, W Ma, D Tran, P Nguyen, D Phung
2014 International Joint Conference on Neural Networks (IJCNN), 4029-4034, 2014
462014
The good and not so good of enforcing password composition rules
J Campbell, D Kleeman, W Ma
Information Systems Security 16 (1), 2-8, 2007
442007
A novel spam email detection system based on negative selection
W Ma, D Tran, D Sharma
2009 Fourth International Conference on Computer Sciences and Convergence …, 2009
392009
Negative selection with antigen feedback in intrusion detection
W Ma, D Tran, D Sharma
International Conference on Artificial Immune Systems, 200-209, 2008
322008
An optimal sphere and two large margins approach for novelty detection
T Le, D Tran, W Ma, D Sharma
The 2010 International Joint Conference on Neural Networks (IJCNN), 1-6, 2010
302010
A security architecture for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
282008
Investigating the possibility of applying EEG lossy compression to EEG-based user authentication
B Nguyen, D Nguyen, W Ma, D Tran
2017 international joint conference on neural networks (IJCNN), 79-85, 2017
242017
A study on the feasibility of using EEG signals for authentication purpose
T Pham, W Ma, D Tran, P Nguyen, D Phung
International Conference on Neural Information Processing, 562-569, 2013
232013
A comprehensive survey of the feature extraction methods in the EEG research
MA Rahman, W Ma, D Tran, J Campbell
International Conference on Algorithms and Architectures for Parallel …, 2012
222012
EEG-based user authentication in multilevel security systems
T Pham, W Ma, D Tran, P Nguyen, D Phung
International conference on advanced data mining and applications, 513-523, 2013
212013
A study on the feature selection of network traffic for intrusion detection purpose
W Ma, D Tran, D Sharma
2008 IEEE International Conference on Intelligence and Security Informatics …, 2008
212008
Age and gender classification using EEG paralinguistic features
P Nguyen, D Tran, X Huang, W Ma
2013 6th International IEEE/EMBS Conference on Neural Engineering (NER …, 2013
202013
EEG-based person verification using multi-sphere SVDD and UBM
P Nguyen, D Tran, T Le, X Huang, W Ma
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 289-300, 2013
202013
A conceptual framework for assessing password quality
W Ma, J Campbell, D Tran, D Kleeman
International Journal of Computer Science and Network Security 7 (1), 179-185, 2007
202007
Fuzzy multi-sphere support vector data description
T Le, D Tran, W Ma
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 570-581, 2013
192013
The system can't perform the operation now. Try again later.
Articles 1–20