default search action
Kok-Seng Wong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Nursultan Makhanov, Nhan Duc Ho, Kok-Seng Wong, Nguyen Anh Tu:
Towards good practice for convolution and attention with PANs in federated medical image classification. J. Supercomput. 81(1): 26 (2025) - 2024
- [j23]Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, Hieu H. Pham, Khoa D. Doan, Kok-Seng Wong:
Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions. Eng. Appl. Artif. Intell. 127(Part A): 107166 (2024) - [j22]Quan Nguyen, Hieu H. Pham, Kok-Seng Wong, Phi Le Nguyen, Truong Thao Nguyen, Minh N. Do:
FedDCT: Federated Learning of Large Convolutional Neural Networks on Resource-Constrained Devices Using Divide and Collaborative Training. IEEE Trans. Netw. Serv. Manag. 21(1): 418-436 (2024) - [c23]Duy C. Hoang, Nguyen Hung-Quang, Saurav Manchanda, Minlong Peng, Kok-Seng Wong, Khoa D. Doan:
Fooling the Textual Fooler via Randomizing Latent Representations. ACL (Findings) 2024: 14403-14421 - [c22]Khiem Le, Long Ho, Cuong Do, Danh Le Phuoc, Kok-Seng Wong:
Efficiently Assemble Normalization Layers and Regularization for Federated Domain Generalization. CVPR 2024: 6027-6036 - [c21]Toan D. Gian, Tien Dac Lai, Thien Van Luong, Kok-Seng Wong, Van-Dinh Nguyen:
HPE-Li: WiFi-Enabled Lightweight Dual Selective Kernel Convolution for Human Pose Estimation. ECCV (31) 2024: 93-111 - [c20]Nguyen Hung-Quang, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan:
Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks. ICLR 2024 - [c19]Nguyen Anh Tu, Assanali Abu, Nartay Aikyn, Nursultan Makhanov, Min-Ho Lee, Khiem Le-Huy, Kok-Seng Wong:
FedFSLAR: A Federated Learning Framework for Few-shot Action Recognition. WACV (Workshops) 2024: 270-279 - [c18]Ngoc-Hieu Nguyen, Tuan-Anh Nguyen, Tuan Nguyen, Vu Tien Hoang, Dung D. Le, Kok-Seng Wong:
Towards Efficient Communication and Secure Federated Recommendation System via Low-rank Training. WWW 2024: 3940-3951 - [i16]Ngoc-Hieu Nguyen, Tuan-Anh Nguyen, Tuan Nguyen, Vu Tien Hoang, Dung D. Le, Kok-Seng Wong:
Towards Efficient Communication Federated Recommendation System via Low-rank Training. CoRR abs/2401.03748 (2024) - [i15]Khiem Le-Huy, Long Ho, Cuong Do, Danh Le Phuoc, Kok-Seng Wong:
Efficiently Assemble Normalization Layers and Regularization for Federated Domain Generalization. CoRR abs/2403.15605 (2024) - [i14]Khiem Le, Nhan Luong-Ha, Manh Nguyen-Duc, Danh Le Phuoc, Cuong Do, Kok-Seng Wong:
Exploring the Practicality of Federated Learning: A Survey Towards the Communication Perspective. CoRR abs/2405.20431 (2024) - [i13]Son Nguyen, Thinh Nguyen, Khoa D. Doan, Kok-Seng Wong:
Venomancer: Towards Imperceptible and Target-on-Demand Backdoor Attacks in Federated Learning. CoRR abs/2407.03144 (2024) - [i12]Tuan Nguyen, Dung Thuy Nguyen, Khoa D. Doan, Kok-Seng Wong:
Non-Cooperative Backdoor Attacks in Federated Learning: A New Threat Landscape. CoRR abs/2407.07917 (2024) - [i11]Quang H. Nguyen, Nguyen Ngoc-Hieu, The-Anh Ta, Thanh Nguyen-Tang, Kok-Seng Wong, Hoang Thanh-Tung, Khoa D. Doan:
Wicked Oddities: Selectively Poisoning for Effective Clean-Label Backdoor Attacks. CoRR abs/2407.10825 (2024) - [i10]Thinh Nguyen, Khoa D. Doan, Binh T. Nguyen, Danh Le Phuoc, Kok-Seng Wong:
Overcoming Catastrophic Forgetting in Federated Class-Incremental Learning via Federated Global Twin Generator. CoRR abs/2407.11078 (2024) - [i9]Thinh Dao, Cuong Chi Le, Khoa D. Doan, Kok-Seng Wong:
Towards Clean-Label Backdoor Attacks in the Physical World. CoRR abs/2407.19203 (2024) - 2023
- [c17]Thai-Hung Nguyen, Hong-Phuc Vu, Thuy Dung Nguyen, Tuan Minh Nguyen, Khoa D. Doan, Kok-Seng Wong:
Empirical Study of Federated Unlearning: Efficiency and Effectiveness. ACML 2023: 959-974 - [c16]Thuy Dung Nguyen, Anh Duy Nguyen, Thanh-Hung Nguyen, Kok-Seng Wong, Huy Hieu Pham, Truong Thao Nguyen, Phi Le Nguyen:
FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients Inspection. IJCNN 2023: 1-10 - [c15]Thuy Dung Nguyen, Tuan Nguyen, Anh Tran, Khoa D. Doan, Kok-Seng Wong:
IBA: Towards Irreversible Backdoor Attacks in Federated Learning. NeurIPS 2023 - [i8]Van Tuan Tran, Huy Hieu Pham, Kok-Seng Wong:
Personalized Privacy-Preserving Framework for Cross-Silo Federated Learning. CoRR abs/2302.12020 (2023) - [i7]Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, Hieu H. Pham, Khoa D. Doan, Kok-Seng Wong:
Backdoor Attacks and Defenses in Federated Learning: Survey, Challenges and Future Research Directions. CoRR abs/2303.02213 (2023) - [i6]Thuy Dung Nguyen, Anh Duy Nguyen, Kok-Seng Wong, Huy Hieu Pham, Thanh Hung Nguyen, Phi Le Nguyen, Truong Thao Nguyen:
FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients Inspection. CoRR abs/2305.00328 (2023) - [i5]Kok-Seng Wong, Manh Nguyen-Duc, Khiem Le-Huy, Long Ho-Tuan, Cuong Do-Danh, Danh Le Phuoc:
An Empirical Study of Federated Learning on IoT-Edge Devices: Resource Allocation and Heterogeneity. CoRR abs/2305.19831 (2023) - [i4]Quang H. Nguyen, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan:
Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks. CoRR abs/2310.00567 (2023) - [i3]Duy C. Hoang, Quang H. Nguyen, Saurav Manchanda, Minlong Peng, Kok-Seng Wong, Khoa D. Doan:
Fooling the Textual Fooler via Randomizing Latent Representations. CoRR abs/2310.01452 (2023) - [i2]Sze Jue Yang, Chinh D. La, Quang H. Nguyen, Eugene Bagdasaryan, Kok-Seng Wong, Anh Tuan Tran, Chee Seng Chan, Khoa D. Doan:
Synthesizing Physical Backdoor Datasets: An Automated Framework Leveraging Deep Generative Models. CoRR abs/2312.03419 (2023) - 2022
- [j21]Tu Viet Nguyen, Nhan Duc Ho, Hieu Thien Hoang, Cuong Do-Danh, Kok-Seng Wong:
Toward Efficient Hierarchical Federated Learning Design Over Multi-Hop Wireless Communications Networks. IEEE Access 10: 111910-111922 (2022) - [j20]Yee Jian Chew, Nicholas Lee, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang:
Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling. Inf. Secur. J. A Glob. Perspect. 31(5): 544-565 (2022) - [c14]Nursultan Makhanov, Nguyen Anh Tu, Kok-Seng Wong:
A Survey on Deep Learning Advances and Emerging Issues in Pneumonia and COVID19 Prediction. BigComp 2022: 96-103 - [c13]Thai-Hung Nguyen, Truong Giang Vu, Huong-Lan Tran, Kok-Seng Wong:
Emerging Privacy and Trust Issues for Autonomous Vehicle Systems. ICOIN 2022: 52-57 - [c12]Rakhat Abdrakhmanov, Dmitriy Viderman, Kok-Seng Wong, Minho Lee:
Few-Shot Learning based on Residual Neural Networks for X-ray Image Classification. SMC 2022: 1817-1821 - [i1]Quan Nguyen, Hieu H. Pham, Kok-Seng Wong, Phi Le Nguyen, Truong Thao Nguyen, Minh N. Do:
FedDCT: Federated Learning of Large Convolutional Neural Networks on Resource Constrained Devices using Divide and Co-Training. CoRR abs/2211.10948 (2022) - 2021
- [j19]Thai-Hung Nguyen, Kok-Seng Wong, Thomas Oikonomou:
Efficient Two-Party Integer Comparison With Block Vectorization Mechanism. IEEE Access 9: 123484-123492 (2021) - [j18]Kok-Seng Wong, Yee Jian Chew, Shih Yin Ooi, Ying-Han Pang:
Toward forecasting future day air pollutant index in Malaysia. J. Supercomput. 77(5): 4813-4830 (2021) - [j17]Nguyen Anh Tu, Thien Huynh-The, Kok-Seng Wong, M. Fatih Demirci, Young-Koo Lee:
Toward efficient and intelligent video analytics with visual privacy protection for large-scale surveillance. J. Supercomput. 77(12): 14374-14404 (2021) - 2020
- [c11]Kok-Seng Wong, Nguyen Anh Tu, Anuar Maratkhan, M. Fatih Demirci:
A Privacy-Preserving Framework for Surveillance Systems. ICCNS 2020: 91-98 - [c10]Dinh-Mao Bui, Nguyen Anh Tu, Kok-Seng Wong:
Enhancing the Adaptiveness of Gaussian Process Regression based on Power Spectral Density. IMCOM 2020: 1-6 - [c9]Nguyen Anh Tu, Thien Huynh-The, Kok-Seng Wong, Dinh-Mao Bui, Young-Koo Lee:
Distributed Feature Extraction on Apache Spark for Human Action Recognition. IMCOM 2020: 1-6
2010 – 2019
- 2019
- [j16]Ao Zhou, Shangguang Wang, Ching-Hsien Hsu, Myung Ho Kim, Kok-Seng Wong:
Virtual machine placement with (m, n)-fault tolerance in cloud data center. Clust. Comput. 22(5): 11619-11631 (2019) - [c8]Yee Jian Chew, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang:
Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System. ICSCA 2019: 569-573 - [c7]Kok-Seng Wong, Myung Ho Kim:
A Privacy-Preserving Coalition Loyalty Program. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1283-1288 - 2018
- [j15]Kok-Seng Wong, Myung Ho Kim:
Emerging issues and challenges for cloud data at the edge. Int. J. Web Grid Serv. 14(2): 123-145 (2018) - [j14]Yee Jian Chew, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang, Seong Oun Hwang:
Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system. J. Intell. Fuzzy Syst. 35(6): 5927-5937 (2018) - [j13]Kok-Seng Wong, Myung Ho Kim:
Toward a fair indictment for sealed-bid auction with self-enforcing privacy. J. Supercomput. 74(8): 3801-3819 (2018) - [j12]Shangguang Wang, Wu Chou, Kok-Seng Wong, Ao Zhou, Victor C. M. Leung:
Service Migration in Mobile Edge Computing. Wirel. Commun. Mob. Comput. 2018: 3823721:1-3823721:2 (2018) - 2017
- [j11]Ao Zhou, Shangguang Wang, Ching-Hsien Hsu, Myung Ho Kim, Kok-Seng Wong:
Network failure-aware redundant virtual machine placement in a cloud data center. Concurr. Comput. Pract. Exp. 29(24) (2017) - [j10]Kok-Seng Wong, Myung Ho Kim:
Secure rank correlation computation for IoT applications. Int. J. Serv. Technol. Manag. 23(1/2): 40-51 (2017) - [j9]Yan Guo, Shangguang Wang, Kok-Seng Wong, Myung Ho Kim:
Skyline service selection approach based on QoS prediction. Int. J. Web Grid Serv. 13(4): 425-447 (2017) - [j8]Kok-Seng Wong, Myung Ho Kim:
Privacy Protection for Data-Driven Smart Manufacturing Systems. Int. J. Web Serv. Res. 14(3): 17-32 (2017) - 2016
- [j7]Kok-Seng Wong, Myung Ho Kim:
An enhanced user authentication solution for mobile payment systems using wearables. Secur. Commun. Networks 9(17): 4639-4649 (2016) - 2015
- [j6]Kok-Seng Wong, Myung Ho Kim:
Towards a respondent-preferred k i -anonymity model. Frontiers Inf. Technol. Electron. Eng. 16(9): 720-731 (2015) - [c6]Kok-Seng Wong, Minji Seo, Myung Ho Kim:
Secure Two-Party Rank Correlation Computations for Recommender Systems. TrustCom/BigDataSE/ISPA (1) 2015: 1022-1028 - 2014
- [j5]Kok-Seng Wong, Myung Ho Kim:
Towards Self-Awareness Privacy Protection for Internet of Things Data Collection. J. Appl. Math. 2014: 827959:1-827959:9 (2014) - [j4]Kok-Seng Wong, Myung Ho Kim:
On private Hamming distance computation. J. Supercomput. 69(3): 1123-1138 (2014) - [c5]Kok-Seng Wong, Myung Ho Kim:
Privacy-Preserving Data Collection with Self-Awareness Protection. FCC 2014: 365-371 - 2013
- [j3]Kok-Seng Wong, Myung Ho Kim:
Privacy-preserving similarity coefficients for binary data. Comput. Math. Appl. 65(9): 1280-1290 (2013) - [c4]Kok-Seng Wong, Myung Ho Kim:
Secure Re-publication of Dynamic Big Data. CSS 2013: 468-477 - 2012
- [j2]Kok-Seng Wong, Myung Ho Kim:
Privacy-preserving frequent itemsets mining via secure collaborative framework. Secur. Commun. Networks 5(3): 263-272 (2012) - [c3]Kok-Seng Wong, Myung Ho Kim:
Secure Biometric-Based Authentication for Cloud Computing. CLOSER (Selected Papers) 2012: 86-101 - [c2]Kok-Seng Wong, Myung Ho Kim:
Towards Biometric-based Authentication for Cloud Computing. CLOSER 2012: 501-510 - [c1]Kok-Seng Wong, Myung Ho Kim:
A Privacy-Preserving Biometric Matching Protocol for Iris Codes Verification. MUSIC 2012: 120-125 - 2010
- [j1]Kok-Seng Wong, Myung Ho Kim:
Semi-trusted Collaborative Framework for Multi-party Computation. KSII Trans. Internet Inf. Syst. 4(3): 411-427 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint