Ryan K. L. Ko

Orcid: 0000-0003-0804-1176

According to our database1, Ryan K. L. Ko authored at least 54 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience.
Proceedings of the ACM on Web Conference 2024, 2024

2023
TypeScript's Evolution: An Analysis of Feature Adoption Over Time.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

FDGATII: Fast Dynamic Graph Attention with Initial Residual and Identity.
Proceedings of the AI 2022: Advances in Artificial Intelligence, 2022

SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

2021
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021

SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Plan2Defend: AI Planning for Cybersecurity in Smart Grids.
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021

Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis.
Proceedings of the Computer Security - ESORICS 2021, 2021

On Random Editing in LZ-End.
Proceedings of the 31st Data Compression Conference, 2021

2020
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

PrivColl: Practical Privacy-Preserving Collaborative Machine Learning.
Proceedings of the Computer Security - ESORICS 2020, 2020

2018
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach.
Proceedings of the 17th IEEE International Conference On Trust, 2018

MetropolJS: visualizing and debugging large-scale javascript program structure with treemaps.
Proceedings of the 26th Conference on Program Comprehension, 2018

2017
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Taxonomy of Man-in-the-Middle Attacks on HTTPS.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

UVisP: User-centric Visualization of Data Provenance with Gestalt Principles.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Computing Mod with a Variable Lookup Table.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

2015
Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Trusted Tamper-Evident Data Provenance.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Secure Voting in the Cloud Using Homomorphic Encryption and Mobile Agents.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

STRATUS: Towards Returning Data Control to Cloud Users.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
End-to-End Secure and Privacy Preserving Mobile Chat Application.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Escrow: A Large-Scale Web Vulnerability Assessment Tool.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Digital Trust - Trusted Computing and Beyond: A Position Paper.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Unified Model for Data Security - A Position Paper.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Consumer-centric protection for online social networks.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Security and Data Accountability in Distributed Systems: A Provenance Survey.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Tracking of Data Leaving the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Formal Concept Discovery in Semantic Web Data.
Proceedings of the Formal Concept Analysis - 10th International Conference, 2012

Automating Compliance for Cloud Computing Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011

TrustCloud: A Framework for Accountability and Trust in Cloud Computing.
Proceedings of the World Congress on Services, 2011

How to Track Your Data: The Case for Cloud Computing Provenance.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Towards Achieving Accountability, Auditability and Trust in Cloud Computing.
Proceedings of the Advances in Computing and Communications, 2011

2009
Genesis.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

Dynamic Collaborative Business Process Formulation via Ontologised Hierarchical Task Network (HTN) Planning.
Proceedings of the IEEE International Conference on Web Services, 2009


  Loading...