Search Results - "Yang, Mee Loong"
-
1
Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach
Published in Journal of computer networks and communications (27-02-2022)“…Attacks on cloud computing (CC) services and infrastructure have raised concerns about the efficacy of data protection mechanisms in this environment. The…”
Get full text
Journal Article -
2
A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments
Published in Future internet (01-08-2024)“…Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other users because of their portability, robust connectivity, and ability to…”
Get full text
Journal Article -
3
Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature
Published in 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) (01-11-2019)“…Using a mobile Internet connection, Mobile Cloud Computing (MCC) customers can access the powerful computational and storage resources made available by MCC…”
Get full text
Conference Proceeding -
4
An Authenticated Key Agreement Scheme for Wireless Sensor Networks
Published in Journal of sensor and actuator networks (01-09-2014)“…We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple master keys and public keys in permutations to compute the…”
Get full text
Journal Article -
5
MOBDroid2: An Improved Feature Selection Method for Detecting Malicious Applications in a Mobile Cloud Computing Environment
Published in 2021 International Conference on Computational Science and Computational Intelligence (CSCI) (01-12-2021)“…This paper presents an ensemble machine learning (ML) based system for the detection of malicious applications in the Mobile Cloud Computing (MCC) Environment…”
Get full text
Conference Proceeding -
6
MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments
Published in 2020 30th International Telecommunication Networks and Applications Conference (ITNAC) (25-11-2020)“…We propose an intelligent malware detection system (MOBDroid) that aims to protect the end-user's mobile device (MD) in mobile cloud computing (MCC)…”
Get full text
Conference Proceeding -
7
SLAM with conceptualisation
Published in 2008 10th International Conference on Control, Automation, Robotics and Vision (01-12-2008)“…In this paper, we presented a novel approach for robot Simultaneous Localization and Mapping (SLAM) in an indoor environment. We observed that such an…”
Get full text
Conference Proceeding -
8
A lightweight authentication scheme for transport system farecards
Published in 2016 IEEE International Conference on RFID Technology and Applications (RFID-TA) (01-09-2016)“…Proximity Integrated Circuit Cards (PICC) are widely used for public transport fare collection. The stored contents in the card can only be accessed or…”
Get full text
Conference Proceeding -
9
The multiple-key blom's scheme for key establishment in mobile ad hoc sensor networks
Published in 2013 19th Asia-Pacific Conference on Communications (APCC) (01-08-2013)“…Unlike schemes based on public key cryptography requiring mathematically expensive operations on large integers, our scheme uses simple modulo arithmetic…”
Get full text
Conference Proceeding -
10
An identity-based authentication protocol for sensor networks
Published in 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (01-04-2014)“…We proposed an identity-based symmetric key authentication protocol using the Multiple-Key Blom's key agreement scheme as the underlying cryptographic system…”
Get full text
Conference Proceeding -
11
Image encryption based on double random phase encoding
Published in 2017 International Conference on Image and Vision Computing New Zealand (IVCNZ) (01-12-2017)“…In this paper, we propose an improved image encryption algorithm based on double random phase encoding (DRPE). Our contribution is the design of a new…”
Get full text
Conference Proceeding -
12
Image denoising based on a CNN model
Published in 2018 4th International Conference on Control, Automation and Robotics (ICCAR) (01-04-2018)“…In digital image processing, filtering noise to reconstruct a high quality image is an important work for further image processing such as object segmentation,…”
Get full text
Conference Proceeding