default search action
Adriel Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Lachlan Simpson, Kyle Millar, Adriel Cheng, Cheng-Chew Lim, Hong Gunn Chew:
Probabilistic Lipschitzness and the Stable Rank for Comparing Explanation Models. CoRR abs/2402.18863 (2024) - [i2]Lachlan Simpson, Federico Costanza, Kyle Millar, Adriel Cheng, Cheng-Chew Lim, Hong Gunn Chew:
Algebraic Adversarial Attacks on Integrated Gradients. CoRR abs/2407.16233 (2024) - 2023
- [j4]Yi Huang, Ying Li, Guillaume Jourjon, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Darren Webb, Richard Yi Da Xu:
Calibrated reconstruction based adversarial autoencoder model for novelty detection. Pattern Recognit. Lett. 169: 50-57 (2023) - [c15]Lachlan Simpson, Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
A Testbed for Automating and Analysing Mobile Devices and Their Applications. ICMLC 2023: 201-208 - [i1]Lachlan Simpson, Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
A Testbed for Automating and Analysing Mobile Devices and their Applications. CoRR abs/2309.08158 (2023) - 2022
- [j3]Ying Li, Yi Huang, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Guillaume Jourjon, Darren Webb, David B. Smith, Richard Yi Da Xu:
From traffic classes to content: A hierarchical approach for encrypted traffic classification. Comput. Networks 212: 109017 (2022) - [j2]Yi Huang, Ying Li, Timothy Heyes, Guillaume Jourjon, Adriel Cheng, Suranga Seneviratne, Kanchana Thilakarathna, Darren Webb, Richard Yi Da Xu:
Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout. Pattern Recognit. Lett. 159: 132-139 (2022) - 2021
- [c14]Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
Clustering Network-Connected Devices Using Affiliation Graphs. ICMLC 2021: 1-7 - [c13]Kyle Millar, Lachlan Simpson, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
Detecting Botnet Victims Through Graph-Based Machine Learning. ICMLC 2021: 1-6 - 2020
- [c12]Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
Operating System Classification: A Minimalist Approach. ICMLC 2020: 143-150 - [c11]Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
Characterising Network-Connected Devices Using Affiliation Graphs. NOMS 2020: 1-6
2010 – 2019
- 2018
- [c10]Ying Li, Yi Huang, Richard Yi Da Xu, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Darren Webb, Guillaume Jourjon:
Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic. NCA 2018: 1-8 - [c9]Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
Deep Learning for Classifying Malicious Network Traffic. PAKDD (Workshops) 2018: 156-161 - 2016
- [c8]Latchman Singh, Adriel Cheng:
Distilling command and control network intrusions from network flow metadata using temporal PageRank. ITNAC 2016: 107-114 - 2014
- [c7]Adriel Cheng, Peter Dickinson:
Exploiting graph compression techniques for coding and monitoring of networks. ICC 2014: 1173-1178 - 2013
- [c6]Adriel Cheng, Peter Dickinson:
Using Scan-Statistical Correlations for Network Change Analysis. PAKDD Workshops 2013: 1-13 - 2011
- [j1]Adriel Cheng, Cheng-Chew Lim:
Markov modelling and parameterisation of genetic evolutionary test generations. J. Glob. Optim. 51(4): 743-751 (2011)
2000 – 2009
- 2008
- [c5]Adriel Cheng, Cheng-Chew Lim, Yihe Sun, Hu He, Zhixiong Zhou, Ting Lei:
Using Genetic Evolutionary Software Application Testing to Verify a DSP SoC. DELTA 2008: 20-25 - 2007
- [c4]Zhixiong Zhou, Hu He, Yanjun Zhang, Yihe Sun, Adriel Cheng:
A 2-Dimension Force-Directed Scheduling Algorithm for Register-File-Connectivity Clustered VLIW Architecture. ASAP 2007: 371-376 - 2006
- [c3]Adriel Cheng, Atanas N. Parashkevov, Cheng-Chew Lim:
Coverage Measurement for Software Application Testing using Partially Ordered Domains and Symbolic Trajectory Evaluation Techniques. DELTA 2006: 481-487 - 2005
- [c2]Adriel Cheng, Cheng-Chew Lim, Atanas N. Parashkevov:
A software test program generator for verifying system-on-chips. HLDVT 2005: 79-86 - 2004
- [c1]Adriel Cheng, Atanas N. Parashkevov, Cheng-Chew Lim:
Coverage Measurement for Software Application Level Verification using Symbolic Trajectory Evaluation Techniques. DELTA 2004: 237-244
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint