Sye Loong Keoh

Orcid: 0000-0003-3640-5010

According to our database1, Sye Loong Keoh authored at least 58 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Performance Measurement in Optimizing Customer Relationship Management Systems through Robotic Process Automation with FlaUI.
Proceedings of the 7th International Conference on Information and Computer Technologies, 2024

An ANN-Based Prediction Model for Public Bus Journey Time.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

Predicting Estimated Time of Arrival Using Boosting Models.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

2023
Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2023

Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments.
Proceedings of the Critical Infrastructure Protection XVII, 2023

Experiences and Lessons Learned from Real-World Projects in Software Engineering Subject.
Proceedings of the 35th International Conference on Software Engineering Education and Training, 2023

2022
Risk Assessment Methodologies for Autonomous Driving: A Survey.
IEEE Trans. Intell. Transp. Syst., 2022

Adaptive Model Verification for Modularized Industry 4.0 Applications.
IEEE Access, 2022

Infrastructure-Based Pedestrian Risk Tagging Methodology to Support AV Risk Assessment.
IEEE Access, 2022

Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Learning Experiences and Analysis in Professional Software Development Subject.
Proceedings of the IEEE International Conference on Teaching, 2022

Authentication and Integrity Protection for Real-Time Cyber-Physical Systems.
Proceedings of the Handbook of Real-Time Computing, 2022

2021
Performance Evaluation of a Blockchain-based Content Distribution over Wireless Mesh Networks.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Real-time Recursive Risk Assessment Framework for Autonomous Vehicle Operations.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Non-Verbal Auditory Aspects of Human-Service Robot Interaction.
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021

GPS Signal Authentication Using a Chameleon Hash Keychain.
Proceedings of the Critical Infrastructure Protection XV, 2021

2020
Trust and Reputation Management for Securing Collaboration in 5G Access Networks: The Road Ahead.
IEEE Access, 2020

Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications.
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

Deployment of Facial Recognition Models at the Edge: A Feasibility Study.
Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium, 2020

An Efficient Scheme to Secure Data Provenance in Home Area Networks.
Proceedings of the 3rd IEEE 5G World Forum, 2020

2019
A Non-GPS based Location Tracking of Public Buses using Bluetooth Proximity Beacons.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Bluetooth Mesh Networking: An Enabler of Smart Factory Connectivity and Management.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2018
Chameleon: A blind double trapdoor hash function for securing AMI data aggregation.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

SEABASS: Symmetric-keychain encryption and authentication for building automation systems.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Autonomous vehicle ultrasonic sensor vulnerability and impact assessment.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

2017
Secure Data Provenance in Home Energy Monitoring Networks.
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 2017

ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Secure Service Virtualization in IoT by Dynamic Service Dependency Verification.
IEEE Internet Things J., 2016

Route Selection for Multi-Hop Cognitive Radio Networks Using Reinforcement Learning: An Experimental Study.
IEEE Access, 2016

Personalized ambience: An integration of learning model and intelligent lighting control.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

A crowd-assisted real-time public transport information service: No more endless wait.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

2015
Flexible Yet Secure De-duplication Service for Enterprise Data on Cloud Storage.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

A lightweight privacy-preserved spatial and temporal aggregation of energy data.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
Securing the Internet of Things: A Standardization Perspective.
IEEE Internet Things J., 2014

Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Securing the IP-based internet of things with HIP and DTLS.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

HADA: Hybrid Access Decision Architecture for Building Automation and Control Systems.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

HIP Security Architecture for the IP-Based Internet of Things.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
End-to-End Transport Security in the IP-Based Internet of Things.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Security Challenges in the IP-based Internet of Things.
Wirel. Pers. Commun., 2011

Marlin: toward seamless content sharing and rights management.
IEEE Commun. Mag., 2011

Efficient Group Key Management and Authentication for Body Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

2009
A lightweight policy system for body sensor networks.
IEEE Trans. Netw. Serv. Manag., 2009

Vesta: A secure and autonomic system for pervasive healthcare.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Securing Body Sensor Networks: Sensor Association and Key Management.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An implementation experience of domain management in marlin.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

2008
AMUSE: autonomic management of ubiquitous e-Health systems.
Concurr. Comput. Pract. Exp., 2008

Finger: An efficient policy system for body sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

An Efficient Policy System for Body Sensor Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

A Role-Based Infrastructure for the Management of Dynamic Communities.
Proceedings of the Resilient Networks and Services, 2008

2007
Towards Supporting Interactions between Self-Managed Cells.
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007

Self-Managed Cell: A Middleware for Managing Body-Sensor Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Policy-based Management for Body-Sensor Networks.
Proceedings of the 4th International Workshop on Wearable and Implantable Body Sensor Networks, 2007

2005
A policy-based security framework for ad-hoc networks.
PhD thesis, 2005

An Efficient Access Control Model for Mobile Ad-Hoc Communities.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

2004
PEACE: A Policy-Based Establishment of Ad-hoc Communities.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2002
Towards flexible credential verification in mobile ad-hoc networks.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002


  Loading...