Apologies

Due to recent migration from another web hoster, I am still in the process of uploading files, so not all files are online yet. Sorry for the inconvenience.

Source code

Publications

The following list is formatted using the BiBTeX package unsrt. Citation counts are available on my Google Scholar profile.

Book chapters

  1. Yee Wei Law and Marimuthu Palaniswami. Key management in wireless sensor networks. In Sudip Misra, Issac Woungang, and Subhas Chandra Misra, editors, Guide to Wireless Sensor Networks, Computer Communications and Networks, chapter 20, pages 513-532. Springer, 2009.
  2. Yee Wei Law, Marimuthu Palaniswami, and Raphael Chung-Wei Phan. Secure data aggregation in wireless sensor networks. In Sudip Misra, Issac Woungang, and Subhas Chandra Misra, editors, Guide to Wireless Sensor Networks, Computer Communications and Networks, chapter 21, pages 533-560. Springer, 2009.
  3. Yee Wei Law, Li-Hsing Yen, Roberto Di Pietro, and Marimuthu Palaniswami. Secure k-Connectivity Properties of Wireless Sensor Networks. In Zhen Jiang and Yi Pan, editors, From Problem to Solution: Wireless Sensor Networks Security, chapter 13, pages 257-270. NOVA Science Publishers, 2009.

Journal articles

  1. Asanka G. Perera, Yee Wei Law, Ali Al-Naji, and Javaan Chahl. Human motion analysis from UAV video. International Journal of Intelligent Unmanned Systems, 2018. Accepted on 5 Apr 2018, to appear.
  2. Jun-Wei Li, Shi-Ning Li, Yu Zhang, Tao Gu, Yee Wei Law, Zhe Yang, Xingshe Zhou, and Marimuthu Palaniswami. An analytical model for coding-based reprogramming protocols in lossy wireless sensor networks. IEEE Transactions on Computers, 66(1):24-37, 2017.
  3. Yee Wei Law, Tansu Alpcan, and Marimuthu Palaniswami. Security games for risk minimization in automatic generation control. IEEE Transactions on Power Systems, 30(1):223-232, January 2015.
  4. Slaven Marusic, Jayavardhana Gubbi, Helen Sullivan, Yee Wei Law, and Marimuthu Palaniswami. Participatory sensing, privacy and trust management for interactive local governance. IEEE Technology and Society Magazine, 33(3), 2014.
  5. Anthony Lo, Yee Wei Law, and Martin Jacobsson. A cellular-centric service architecture for Machine-to-Machine (M2M) communications. IEEE Wireless Communications Magazine, 20(5):143-151, 2013.
  6. Yee Wei Law, Marimuthu Palaniswami, Gina Kounga, and Anthony Lo. WAKE: Key Management Scheme for Wide-Area Measurement Systems in Smart Grid. IEEE Communications Magazine, 51(1):34–41, January 2013.
  7. Li-Hsing Yen, Yee Wei Law, and Marimuthu Palaniswami. Risk-Aware Distributed Beacon Scheduling for Tree-Based ZigBee Wireless Networks. IEEE Transactions on Mobile Computing, 11(4):692-703, April 2012. C/C++, MATLAB, Mathematica and R code
  8. Yu Zhang, Xing She Zhou, Yee Wei Law, and Marimuthu Palaniswami. A secure method for network coding-based reprogramming protocols in wireless sensor networks. International Journal of Computer Network and Information Security, 3(2):34-40, March 2011.
  9. Yee Wei Law, Giorgi Moniava, Zheng Gong, Pieter Hartel, and Marimuthu Palaniswami. KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. Security and Communication Networks, 4:1309-1329, 2011. Scyther and ProVerif code
  10. Yee Wei Law, Yu Zhang, Jiong Jin, Marimuthu Palaniswami, and Paul Havinga. Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks. EURASIP Journal on Wireless Communications and Networking: Special Issue on Security and Resilience for Smart Devices and Applications, 2011, 2011. Article ID 685219, 22 pages. TinyOS/nesC and Python code
  11. Yu Zhang, Xing She Zhou, Yi Ming Ji, Yee Wei Law, and Marimuthu Palaniswami. Five basic types of insider DoS attacks of code dissemination in Wireless Sensor Networks. International Journal of Communications, Network and System Sciences, 2(1):64-72, February 2009.
  12. Yee Wei Law, Marimuthu Palaniswami, Lodewijk van Hoesel, Jeroen Doumen, Pieter Hartel, and Paul Havinga. Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5(1):article 6, February 2009. OMNeT++/C++ code
  13. Cheun Ngen Chong, Ricardo Corin, Jeroen M. Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, and Andrew Tokmakoff. LicenseScript: A Logical Language for Digital Rights Management. Annals of Telecommunications, Special Issue on Information Systems Security, 61(3-4):284-331, March 2006.
  14. Yee Wei Law, Jeroen Doumen, and Pieter Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks, 2(1):65-93, February 2006. C code

Conference papers

  1. Asanka G. Perera, Ali Al-Naji, Yee Wei Law, and Javaan Chahl. Human detection and motion analysis from a quadrotor UAV. In AEROTECH VII CONFERENCE 2018: Sustainability in Aerospace Engineering & Technology, 2018. Accepted on 2 April 2018, to appear.
  2. Lingjuan Lyu, Xuanli He, Yee Wei Law, and Marimuthu Palaniswami. Privacy-preserving collaborative deep learning with application to human activity recognition. In The 26th ACM International Conference on Information and Knowledge Management (CIKM), 2017. Accepted on 5 August 2017, to appear.
  3. Lingjuan Lyu, Yee Wei Law, Jiong Jin, and Marimuthu Palaniswami. Privacy-preserving aggregation of smart metering via transformation and encryption. In The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17), 2017. Accepted on 15 May 2017, to appear.
  4. Lingjuan Lyu, Yee Wei Law, Sarah M. Erfani, Christopher Leckie, and Marimuthu Palaniswami. An improved scheme for privacy-preserving collaborative anomaly detection. In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), March 2016.
  5. Boda Ning, Jiong Jin, Jinchuan Zheng, and Yee Wei Law. Connectivity control and performance optimization in wireless robotic networks: Issues, approaches and a new framework. In 2014 Proceedings of the 6th International Conference on Modelling, Identification Control (ICMIC), pages 142–148, December 2014.
  6. Yee Wei Law, Hemanshu Pota, Jiong Jin, Zhihong Man, and Marimuthy Palaniswami. Control and communication techniques for the smart grid: An energy efficiency perspective. In The 19th World Congress of the International Federation of Automatic Control (IFAC 2014), volume 19, pages 987–998, 2014.
  7. Sarah M. Erfani, Yee Wei Law, Shanika Karunasekera, Christopher A. Leckie, and Marimuthu Palaniswami. Privacy-preserving collaborative anomaly detection for participatory sensing. In Advances in Knowledge Discovery and Data Mining, volume 8443 of Lecture Notes in Computer Science, pages 581–593. Springer International Publishing, 2014.
  8. Jayavardhana Gubbi, Slaven Marusic, Aravinda S. Rao, Yee Wei Law, and Marimuthu Palaniswami. A pilot study of urban noise monitoring architecture using wireless sensor networks. In International Conference on Advances in Computing, Communications and Informatics (ICACCI-2013), 2013.
  9. Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, and Marimuthu Palaniswami. Comparative study of multicast authentication schemes with application to wide-area measurement system. In 8th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2013), pages 287–298, 2013.
  10. Jun wei Li, Shi-Ning Li, Yu Zhang, Yee Wei Law, Xingshe Zhou, and M. Palaniswami. Analytical model of coding- based reprogramming protocols in lossy wireless sensor networks. In 2013 IEEE International Conference on Communications (ICC), pages 1867–1871, June 2013.
  11. Tie Luo, Hwee-Pink Tan, P.C. Quan, Yee Wei Law, and Jiong Jin. Enhancing responsiveness and scalability for openflow networks via control-message quenching. In 2012 International Conference on ICT Convergence (ICTC 2012), pages 348–353, October 2012. Best paper award.
  12. Yee Wei Law, Tansu Alpcan, and Marimuthu Palaniswami. Security Games for Voltage Control in Smart Grid. In 50th Annual Allerton Conference on Communication, Control, and Computing, pages 212-219, Oct. 2012. MATLAB/Simulink code
  13. Yee Wei Law, Tansu Alpcan, Marimuthu Palaniswami, and Subhrakanti Dey. Security games and risk minimization for automatic generation control in smart grid. In J. Grossklags and J. Walrand, editors, Proc. 3rd Conference on Decision and Game Theory for Security (GameSec 2012), volume 7638 of LNCS, pages 281–295. Springer Heidelberg, 2012. MATLAB/Simulink code
  14. Yee Wei Law, Tansu Alpcan, Vincent C.S. Lee, Anthony Lo, Slaven Marusic, and Marimuthu Palaniswami. Demand response architectures and load management algorithms for energy-efficient power grids: A survey. In 2012 Seventh International Conference on Knowledge, Information and Creativity Support Systems (KICSS 2012), pages 134–141, November 2012.
  15. Zheng Gong, Svetla Nikova, and Yee Wei Law. KLEIN: A new family of lightweight block ciphers. In Ari Juels and Christof Paar, editors, RFID. Security and Privacy, volume 7055 of Lecture Notes in Computer Science, pages 1-18. Springer Berlin / Heidelberg, 2012. TinyOS/nesC code
  16. Anthony Lo, Yee Wei Law, Martin Jacobsson, and Michal Kucharzak. Enhanced LTE-Advanced Random-Access Mechanism for Massive Machine-to-Machine (M2M) Communications. In 27th Wireless World Research Forum (WWRF27), 2011. CD-ROM publication.
  17. Yu Zhang, Xing She Zhou, Yee Wei Law, and Marimuthu Palaniswami. Efficient homomorphic hashing approach for secure reprogramming in wireless sensor networks. In The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2011), 2011.
  18. Zheng Gong, Qiang Tang, Yee Wei Law, and Hongyang Chen. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In Information Security and Cryptology, volume 6584 of Lecture Notes in Computer Science, pages 268-283. Springer Berlin / Heidelberg, 2011.
  19. Thomas Hanselmann, Yu Zhang, Mark Morelande, Mohd Ifran Md Nor, Jonathan Wei Jen Tan, Xing-She Zhou, and Yee Wei Law. Self-localization in wireless sensor networks using particle filtering with progressive correction. In The 5th International ICST Conference on Communications and Networking in China (CHINACOM 2010), pages 1-6. IEEE, August 2010.
  20. Jiong Jin, Yee Wei Law, Marimuthu Palaniswami, and Zhihong Man. A Unified Flow Control Approach for QoS Balance in Differentiated Services. In 2010 IEEE International Conference on Communications (ICC). IEEE, May 2010.
  21. Andrea Munari, Wolfgang Schott, and Yee Wei Law. Dynamic tunnel routing for reliable and resilient data forwarding in wireless sensor networks. In 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2009), pages 1178-1182. IEEE, September 2009.
  22. Yu Zhang, Xing She Zhou, Yee Wei Law, and Marimuthu Palaniswami. Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. In Fifth International Conference on Information Assurance and Security (IAS '09), volume 2, pages 263-266. IEEE Computer Society, August 2009.
  23. Yee Wei Law, Supriyo Chatterjea, Jiong Jin, Thomas Hanselmann, and Marimuthu Palaniswami. Energy-efficient data acquisition by adaptive sampling for wireless sensor networks. In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC '09, pages 1146-1151. ACM, 2009. R code
  24. Jiong Jin, Yee Wei Law, Wei-Hua Wang, and Marimuthu Palaniswami. A hierarchical transport architecture for wireless sensor networks. In Fourth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2008), pages 145-150. IEEE, December 2008.
  25. Li-Hsing Yen, Yee Wei Law, and Marimuthu Palaniswami. Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks. In Proceedings of the 4th Annual International Conference on Wireless Internet, WICON '08, pages 79:1-79:9, ICST, Brussels, Belgium, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). C/C++, MATLAB, Mathematica and R code
  26. Yee Wei Law and Marimuthu Palaniswami. Resilient network coding for wireless sensor networks. In ICT-MobileSummit 2008. IIMC International Information Management Corporation Ltd, 2008.
  27. Yee Wei Law, James Sing, Braden Kidd, and Slaven Marusic. Secure code distribution in wireless sensor networks. In ICT-MobileSummit 2008 Workshop "Wireless sensor and actuator network research on opposite sides of the globe - Europe/SENSEI and Australia/ISSNIP", 9 June, Stockholm, Sweden. IIMC International Information Management Corporation Ltd, 2008.
  28. Yee Wei Law, Li-Hsing Yen, Roberto Di Pietro, and Marimuthu Palaniswami. Secure k-connectivity properties of wireless sensor networks. In The Fourth IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2007): The Third IEEE International Workshop on Wireless and Sensor Networks Security (WSNS 2007). IEEE, 2007. Mathematica code
  29. Yee Wei Law and Paul J. M. Havinga. How to secure a wireless sensor network. In Proceedings of the 2nd International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2005), pages 89-95. IEEE, December 2005.
  30. Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter Hartel, and Paul Havinga. Energy-Efficient Link Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. In Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN '05, pages 76-88. ACM, 2005. See journal version.
  31. Yee Wei Law, Pieter Hartel, Jerry den Hartog, and Paul Havinga. Link-layer jamming attacks on S-MAC. In Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN 2005), pages 217-225. IEEE, 2005.
  32. Yee Wei Law, Jeroen Doumen, and Pieter Hartel. Benchmarking block ciphers for wireless sensor networks (extended abstract). In The First IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2004), pages 447-456. IEEE Computer Society Press, October 2004. See journal version.
  33. Yee Wei Law, Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, and Ricardo Corin. Licensing structured data with ease. In The 2nd IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods. Technical University Ilmenau, May 2004.
  34. Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, and Yee Wei Law. Approximating Fair Use in LicenseScript. In M. T. Tengku, H. B. Sembok, and H. Zaman, editors, The 6th International Conference of Asian Digital Libraries (ICADL 2003), volume 2911 of LNCS, pages 432-443. Springer-Verlag, December 2003.
  35. Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, and Paul Havinga. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In C.-H. Huang and J. Ramanujam, editors, The 32nd International Conference on Parallel Processing Workshops (ICPPW '03), pages 397-406. IEEE Computer Society Press, October 2003. Conference version: , full version: .
  36. Cheun Ngen Chong, Ricardo Corin, Sandro Etalle, Pieter Hartel, Wim Jonker, and Yee Wei Law. LicenseScript: A Novel Digital Rights Language and its Semantics. In K. Ng, C. Busch, and P. Nesi, editors, The 3rd International Conference on Web Delivering of Music (WEDELMUSIC), pages 122-129. IEEE Computer Society Press, September 2003.
  37. Cheun Ngen Chong, Ricardo Corin, Sandro Etalle, Pieter Hartel, and Yee Wei Law. LicenseScript: A Novel Digital Rights Language. In R. Grimm and J. Nitzel, editors, IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, pages 104-115. Technical University Ilmenau, May 2003.
  38. Yee Wei Law, Ricardo Corin, Sandro Etalle, and Pieter H. Hartel. A formally verified decentralized key management architecture for wireless sensor networks. In The 4th IFIP TC6/WG6.8 International Conference on Personal Wireless Communications (PWC 2003), volume 2775 of LNCS, pages 27-39. Springer-Verlag, September 2003.
  39. Yee Wei Law, Sandro Etalle, and Pieter H. Hartel. Assessing security in energy-efficient sensor networks. In Proceedings of the IFIP TC11 18th International Conference on Information Security (SEC 2003): Security and Privacy in the Age of Uncertainty, pages 459-463. Kluwer Academic Publishers, May 2003.
  40. Yee Wei Law and Kai Yun Chan. NECTAR: Simulation and Visualization in a 3D Collaborative Environment. In EUROMEDIA 2002, pages 47-54. SCS Publishing House, 2002.

Edited volumes

  1. Marimuthu Palaniswami, Slaven Marusic, Jayavardhana Gubbi, and Yee Wei Law, editors. Proceedings of 5th International Conference on Intelligent Sensors, Sensor networks and Information Processing. IEEE, December 2009.
  2. Marimuthu Palaniswami, Slaven Marusic, and Yee Wei Law, editors. Proceedings of 3rd International Conference on Intelligent Sensors, Sensor networks and Information Processing. IEEE, December 2007.

Book reviews

  1. Yee Wei Law and Paul Havinga. Security and dependability for Ambient Intelligence: Informative but busy. Journal of Ambient Intelligence and Smart Environments, 3(4):373-374, November 2011.

Theses

  1. Yee Wei Law. Key management and link-layer security of wireless sensor networks: energy-efficient attack and defense. PhD thesis, University of Twente, 2005.
  2. Yee Wei Law. Simulation and Visualization in a 3D Collaborative Environment. Master's thesis, Nanyang Technological University, 2003.

Slides

Unofficial Unimelb Beamer template (for making presentation slides using LaTeX)
24 Sep 2013, 2 Oct 2013 "Privacy-preserving Data Mining for the Internet of Things: State of the Art" at Institute for Infocomm Research, A*STAR, Singapore
13 Dec 2012 Invited talk “Cyber-physical security of smart grid: threats, countermeasures and risk assessment” at Wenzhou University
20 Nov 2012 "Creating Smart Sustainable Cities through Internet of Things (IoT)" at the inaugural meeting of the European Research Center for Ubiquitous Technologies and Smart Cities (UBICITEC)
14 Mar 2012 "A sensor network researcher's view of smart grid security and privacy issues" for a CRIS (Centre for Research in Intelligent Systems) seminar at Monash University
28 Mar 2011 "Securing Communication Systems for Maximising the Benefits of Smart Grids" for Tonkin's 3rd Annual Smart Grid Forum
9 Dec 2010 "Monitoring of the Smart Grid: An Overview" for ISSNIP/SENSEI Workshop on Infrastructures and Services for Sustainable and Smarter Cities, as part of ISSNIP 2010
8 Dec 2010 "Secure Network Programming and Resilient Control Algorithms" for Workshop on Secure and Trustworthy Sensor Networking, as part of ISSNIP 2010
26 Oct 2010 "Monitoring of the Power Grid: State of the Art" for ISSNIP seminar
31 Mar-4 Apr 2008 "Wireless Sensor Network Security: The State of the Art" for ASCI Springschool on Wireless Sensor Networks, The Netherlands