Privacy protection for data-driven smart manufacturing systems KS Wong, MH Kim International Journal of Web Services Research (IJWSR) 14 (3), 17-32, 2017 | 52 | 2017 |
Virtual machine placement with (m, n)-fault tolerance in cloud data center A Zhou, S Wang, CH Hsu, MH Kim, K Wong Cluster Computing 22, 11619-11631, 2019 | 29 | 2019 |
Towards self-awareness privacy protection for internet of things data collection KS Wong, MH Kim Journal of Applied Mathematics 2014, 2014 | 22 | 2014 |
Decision tree with sensitive pruning in network-based intrusion detection system YJ Chew, SY Ooi, KS Wong, YH Pang Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020 | 20 | 2020 |
Network failure–aware redundant virtual machine placement in a cloud data center A Zhou, S Wang, CH Hsu, MH Kim, K Wong Concurrency and Computation: Practice and Experience 29 (24), e4290, 2017 | 19 | 2017 |
Privacy-preserving similarity coefficients for binary data KS Wong, MH Kim Computers & Mathematics with Applications 65 (9), 1280-1290, 2013 | 19 | 2013 |
Secure biometric-based authentication for cloud computing KS Wong, MH Kim Cloud Computing and Services Science: Second International Conference …, 2013 | 18 | 2013 |
Skyline service selection approach based on QoS prediction Y Guo, S Wang, KS Wong, MH Kim International Journal of Web and Grid Services 13 (4), 425-447, 2017 | 16 | 2017 |
Toward efficient and intelligent video analytics with visual privacy protection for large-scale surveillance NA Tu, T Huynh-The, KS Wong, MF Demirci, YK Lee The Journal of Supercomputing 77 (12), 14374-14404, 2021 | 13 | 2021 |
A privacy-preserving biometric matching protocol for iris codes verification KS Wong, MH Kim 2012 Third FTRA International Conference on Mobile, Ubiquitous, and …, 2012 | 13 | 2012 |
Towards Biometric-based Authentication for Cloud Computing KSWMH Kim 2nd International Conference on Cloud Computing and Services Science …, 2012 | 13* | 2012 |
Collaborative Support for Medical Data Mining in Telemedicine WK Seng, RB Besar, FS Abas Information and Communication Technologies, 2006. ICTTA'06. 2nd 1, 1894-1899, 2006 | 13 | 2006 |
An enhanced user authentication solution for mobile payment systems using wearables KS Wong, MH Kim Security and Communication Networks 9 (17), 4639-4649, 2016 | 12 | 2016 |
Towards a respondent-preferred k i -anonymity model KS Wong, MH Kim Frontiers of Information Technology & Electronic Engineering 16, 720-731, 2015 | 12 | 2015 |
A framework for collaborative graphical based design environments WK Seng, S Palaniappan, NA Yahaya 16th International Workshop on Database and Expert Systems Applications …, 2005 | 12 | 2005 |
A Review of forest fire combating efforts, challenges and future directions in Peninsular Malaysia, Sabah, and Sarawak YJ Chew, SY Ooi, YH Pang, KS Wong Forests 13 (9), 1405, 2022 | 11 | 2022 |
Privacy-preserving collaborative data anonymization with sensitive quasi-identifiers KS Wong, NA Tu, DM Bui, SY Ooi, MH Kim 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 1-6, 2019 | 10 | 2019 |
Privacy-preserving data collection with self-awareness protection KS Wong, MH Kim Frontier and Innovation in Future Computing and Communications, 365-371, 2014 | 10 | 2014 |
Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions TD Nguyen, T Nguyen, P Le Nguyen, HH Pham, KD Doan, KS Wong Engineering Applications of Artificial Intelligence 127, 107166, 2024 | 9 | 2024 |
Emerging privacy and trust issues for autonomous vehicle systems TH Nguyen, TG Vu, HL Tran, KS Wong 2022 International Conference on Information Networking (ICOIN), 52-57, 2022 | 8 | 2022 |