Ryan Kok Leong Ko

Orcid: 0000-0003-0804-1176

Affiliations:
  • The University of Queensland, Brisbane, QLD, Australia
  • University of Waikato, New Zealand (former)


According to our database1, Ryan Kok Leong Ko authored at least 100 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey.
IEEE Commun. Surv. Tutorials, 2024

Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience.
Proceedings of the ACM on Web Conference 2024, 2024

Scp-bp Framework: Situational Crime Prevention for Managing Data Breaches in Business Processes.
Proceedings of the Business Process Management - 22nd International Conference, 2024

2023
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges.
J. Intell. Inf. Syst., April, 2023

Where is the human in human-centered AI? Insights from developer priorities and user experiences.
Comput. Hum. Behav., April, 2023

Realizing credible remote agricultural auditing with trusted video technology.
J. Cybersecur., January, 2023

Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification.
Eng. Appl. Artif. Intell., 2023

TypeScript's Evolution: An Analysis of Feature Adoption Over Time.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Preserving the Privacy and Cybersecurity of Home Energy Data.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

Preserving the Privacy and Cybersecurity of Home Energy Data.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids.
IEEE Trans. Smart Grid, 2022

Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data.
IEEE Trans. Smart Grid, 2022

Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond.
ACM Trans. Sens. Networks, 2022

An exploratory study of organizational cyber resilience, its precursors and outcomes.
J. Organ. Comput. Electron. Commer., 2022

Editorial: Human-Centric Security and Privacy.
Frontiers Big Data, 2022

Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review.
Comput. Secur., 2022

Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

FDGATII: Fast Dynamic Graph Attention with Initial Residual and Identity.
Proceedings of the AI 2022: Advances in Artificial Intelligence, 2022

SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

2021
Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids.
IEEE Trans. Smart Grid, 2021

Security and Privacy in Smart Cities.
Secur. Commun. Networks, 2021

Differentially Private Collaborative Coupling Learning for Recommender Systems.
IEEE Intell. Syst., 2021

FDGATII : Fast Dynamic Graph Attention with Initial Residual and Identity Mapping.
CoRR, 2021

Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning.
CoRR, 2021

ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence.
CoRR, 2021

It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021

SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Plan2Defend: AI Planning for Cybersecurity in Smart Grids.
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021

Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis.
Proceedings of the Computer Security - ESORICS 2021, 2021

On Random Editing in LZ-End.
Proceedings of the 31st Data Compression Conference, 2021

2020
Message from the guest editors.
Int. J. Inf. Sec., 2020

Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security.
CoRR, 2020

Local Editing in LZ-End Compressed Data.
CoRR, 2020

An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

PrivColl: Practical Privacy-Preserving Collaborative Machine Learning.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Data Provenance for Big Data Security and Accountability.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2019

2018
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach.
Proceedings of the 17th IEEE International Conference On Trust, 2018

MetropolJS: visualizing and debugging large-scale javascript program structure with treemaps.
Proceedings of the 26th Conference on Program Comprehension, 2018

2017
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks.
Secur. Commun. Networks, 2017

Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Taxonomy of Man-in-the-Middle Attacks on HTTPS.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

UVisP: User-centric Visualization of Data Provenance with Gestalt Principles.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Computing Mod with a Variable Lookup Table.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

2015
Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Trusted Tamper-Evident Data Provenance.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Inferring User Actions from Provenance Logs.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Secure Voting in the Cloud Using Homomorphic Encryption and Mobile Agents.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

STRATUS: Towards Returning Data Control to Cloud Users.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A guide to homomorphic encryption.
Proceedings of the Cloud Security Ecosystem, 2015

Provenance for cloud data accountability.
Proceedings of the Cloud Security Ecosystem, 2015

Cloud security ecosystem.
Proceedings of the Cloud Security Ecosystem, 2015

Security as a service (SecaaS) - An overview.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks.
Wirel. Pers. Commun., 2014

Special issue on trust and security in cloud computing.
Secur. Commun. Networks, 2014

A toolkit for automating compliance in cloud computing services.
Int. J. Cloud Comput., 2014

Computing Mod Without Mod.
IACR Cryptol. ePrint Arch., 2014

End-to-End Secure and Privacy Preserving Mobile Chat Application.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Escrow: A Large-Scale Web Vulnerability Assessment Tool.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Digital Trust - Trusted Computing and Beyond: A Position Paper.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Unified Model for Data Security - A Position Paper.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Consumer-centric protection for online social networks.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

OpenStack Café: A Novel Time-Based User-centric Resource Management Framework in the Cloud.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

Virtual Numbers for Virtual Machines?
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

'Time' for Cloud? Design and Implementation of a Time-Based Cloud Resource Management System.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Security and Data Accountability in Distributed Systems: A Provenance Survey.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Business-OWL (BOWL) - A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation.
IEEE Trans. Serv. Comput., 2012

How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Tracking of Data Leaving the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Formal Concept Discovery in Semantic Web Data.
Proceedings of the Formal Concept Analysis - 10th International Conference, 2012

Automating Compliance for Cloud Computing Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
From Linked Data to Relevant Data -- Time is the Essence
CoRR, 2011

Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011

TrustCloud: A Framework for Accountability and Trust in Cloud Computing.
Proceedings of the World Congress on Services, 2011

How to Track Your Data: The Case for Cloud Computing Provenance.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Towards Achieving Accountability, Auditability and Trust in Cloud Computing.
Proceedings of the Advances in Computing and Communications, 2011

2010
Cloud computing in plain English.
ACM Crossroads, 2010

2009
A computer scientist's introductory guide to business process management (BPM).
ACM Crossroads, 2009

Business process management (BPM) standards: a survey.
Bus. Process. Manag. J., 2009

Genesis.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

Generating Request Web Services from Annotated BPEL.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009

Dynamic Collaborative Business Process Formulation via Ontologised Hierarchical Task Network (HTN) Planning.
Proceedings of the IEEE International Conference on Web Services, 2009


  Loading...