Follow
Wanli Ma
Wanli Ma
Verified email at canberra.edu.au
Title
Cited by
Cited by
Year
An overview of temporal and modal logic programming
MA Orgun, W Ma
International Conference on Temporal Logic, 445-479, 1994
1871994
Password entropy and password quality
W Ma, J Campbell, D Tran, D Kleeman
2010 fourth international conference on network and system security, 583-587, 2010
1242010
Using Shannon Entropy as EEG Signal Feature for Fast Person Identification.
DQ Phung, D Tran, W Ma, P Nguyen, T Pham
ESANN 4 (1), 413-418, 2014
972014
Senior health monitoring using Kinect
M Parajuli, D Tran, W Ma, D Sharma
2012 Fourth International Conference on Communications and Electronics (ICCE …, 2012
882012
Multi-factor EEG-based user authentication
T Pham, W Ma, D Tran, P Nguyen, D Phung
2014 International Joint Conference on Neural Networks (IJCNN), 4029-4034, 2014
652014
Impact of restrictive composition policy on user password choices
J Campbell, W Ma, D Kleeman
Behaviour & Information Technology 30 (3), 379-388, 2011
642011
A novel spam email detection system based on negative selection
W Ma, D Tran, D Sharma
2009 Fourth International Conference on Computer Sciences and Convergence …, 2009
502009
Age and gender classification using EEG paralinguistic features
P Nguyen, D Tran, X Huang, W Ma
2013 6th International IEEE/EMBS Conference on Neural Engineering (NER …, 2013
472013
The good and not so good of enforcing password composition rules
J Campbell, D Kleeman, W Ma
Information Systems Security 16 (1), 2-8, 2007
432007
An optimal sphere and two large margins approach for novelty detection
T Le, D Tran, W Ma, D Sharma
The 2010 international joint conference on neural networks (IJCNN), 1-6, 2010
382010
EEG-based user authentication in multilevel security systems
T Pham, W Ma, D Tran, P Nguyen, D Phung
Advanced Data Mining and Applications: 9th International Conference, ADMA …, 2013
332013
Negative selection with antigen feedback in intrusion detection
W Ma, D Tran, D Sharma
Artificial Immune Systems: 7th International Conference, ICARIS 2008, Phuket …, 2008
322008
A study on the feasibility of using EEG signals for authentication purpose
T Pham, W Ma, D Tran, P Nguyen, D Phung
Neural Information Processing: 20th International Conference, ICONIP 2013 …, 2013
312013
A comprehensive survey of the feature extraction methods in the EEG research
MA Rahman, W Ma, D Tran, J Campbell
Algorithms and Architectures for Parallel Processing: 12th International …, 2012
312012
A security architecture for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
312008
Investigating the possibility of applying EEG lossy compression to EEG-based user authentication
B Nguyen, D Nguyen, W Ma, D Tran
2017 international joint conference on neural networks (IJCNN), 79-85, 2017
302017
A conceptual framework for assessing password quality
W Ma, J Campbell, D Tran, D Kleeman
International Journal of Computer Science and Network Security 7 (1), 179-185, 2007
302007
A study on the stability of EEG signals for user authentication
T Pham, W Ma, D Tran, DS Tran, D Phung
2015 7th International IEEE/EMBS Conference on Neural Engineering (NER), 122-125, 2015
292015
Multiple distribution data description learning method for novelty detection
T Le, D Tran, P Nguyen, W Ma, D Sharma
The 2011 International Joint Conference on Neural Networks, 2321-2326, 2011
29*2011
On the study of EEG-based cryptographic key generation
D Nguyen, D Tran, D Sharma, W Ma
Procedia computer science 112, 936-945, 2017
282017
The system can't perform the operation now. Try again later.
Articles 1–20