default search action
Sye Loong Keoh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Say Hong Kam, Yung-Wey Chong, Noor Farizah Ibrahim, Sye Loong Keoh, Somnuk Phon-Amnuaisuk, Sharul Kamal Abdul Rahim:
Predicting Estimated Time of Arrival Using Boosting Models. ICAIIC 2024: 467-472 - [c44]Yong Ting Lim, Sye Loong Keoh, Yung-Wey Chong, Noor Farizah Ibrahim, Sharul Kamal Abdul Rahim:
An ANN-Based Prediction Model for Public Bus Journey Time. ICAIIC 2024: 578-583 - [c43]Wei En Tan, Peter Chunyu Yau, Sye Loong Keoh, Ejoe Tso, Dennis Wong, Lai Meng Tang:
Performance Measurement in Optimizing Customer Relationship Management Systems through Robotic Process Automation with FlaUI. ICICT 2024: 549-556 - 2023
- [c42]Yan Hern Ryan Sim, Zhi Zhan Lua, Kahbelan Kalisalvam Kelaver, Jia Qi Chua, Ian Zheng Jiang Lim, Qi Cao, Sye Loong Keoh, Li Hong Idris Lim:
Experiences and Lessons Learned from Real-World Projects in Software Engineering Subject. CSEE&T 2023: 173-177 - [c41]Dee Meng Kang, Haadee Faahym, Souhail Meftah, Sye Loong Keoh, Khin Mi Mi Aung:
Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. Critical Infrastructure Protection 2023: 177-192 - [c40]Ferheen Ayaz, Idris Zakariyya, José Cano, Sye Loong Keoh, Jeremy Singer, Danilo Pau, Mounia Kharbouche-Harrari:
Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks. IJCNN 2023: 1-8 - [i1]Ferheen Ayaz, Idris Zakariyya, José Cano, Sye Loong Keoh, Jeremy Singer, Danilo Pau, Mounia Kharbouche-Harrari:
Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks. CoRR abs/2304.12829 (2023) - 2022
- [j11]Wei Ming Dan Chia, Sye Loong Keoh, Anna Lito Michala, Cindy Goh:
Infrastructure-Based Pedestrian Risk Tagging Methodology to Support AV Risk Assessment. IEEE Access 10: 71462-71480 (2022) - [j10]Xin Xin, Sye Loong Keoh, Michele Sevegnani, Martin Saerbeck, Teck Ping Khoo:
Adaptive Model Verification for Modularized Industry 4.0 Applications. IEEE Access 10: 125353-125364 (2022) - [j9]Wei Ming Dan Chia, Sye Loong Keoh, Cindy Goh, Christopher W. Johnson:
Risk Assessment Methodologies for Autonomous Driving: A Survey. IEEE Trans. Intell. Transp. Syst. 23(10): 16923-16939 (2022) - [c39]Madeline Jia Qi Thong, Arico Qi Xian Yau, Sida Andy Goh, Jinming Gu, Qi Cao, Sye Loong Keoh:
Learning Experiences and Analysis in Professional Software Development Subject. TALE 2022: 703-706 - [c38]Xin Xin, Sye Loong Keoh, Michele Sevegnani, Martin Saerbeck:
Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study. WF-IoT 2022: 1-7 - [p1]Sye Loong Keoh, Heng Chuan Tan, Zhaohui Tang:
Authentication and Integrity Protection for Real-Time Cyber-Physical Systems. Handbook of Real-Time Computing 2022: 569-590 - 2021
- [c37]Yu Han Chu, Sye Loong Keoh, Chee Kiat Seow, Qi Cao, Kai Wen, Soon Yim Tan:
GPS Signal Authentication Using a Chameleon Hash Keychain. Critical Infrastructure Protection 2021: 209-226 - [c36]Jeannie S. Lee, Muhamed Fauzi Bin Abbas, Chee Kiat Seow, Qi Cao, Kar-Peo Yar, Sye Loong Keoh, Ian McLoughlin:
Non-Verbal Auditory Aspects of Human-Service Robot Interaction. SOLI 2021: 1-5 - [c35]Wei Ming Dan Chia, Sye Loong Keoh, Anna Lito Michala, Cindy Goh:
Real-time Recursive Risk Assessment Framework for Autonomous Vehicle Operations. VTC Spring 2021: 1-7 - [c34]Yoshihiro Ohba, Jing Yi Koh, Nigel Ng, Sye Loong Keoh:
Performance Evaluation of a Blockchain-based Content Distribution over Wireless Mesh Networks. WF-IoT 2021: 258-263 - 2020
- [j8]Israr Ahmad, Kok-Lim Alvin Yau, Mee Hong Ling, Sye Loong Keoh:
Trust and Reputation Management for Securing Collaboration in 5G Access Networks: The Road Ahead. IEEE Access 8: 62542-62560 (2020) - [c33]Zhaohui Tang, Sye Loong Keoh:
An Efficient Scheme to Secure Data Provenance in Home Area Networks. 5G World Forum 2020: 115-120 - [c32]Xihao Zhou, Sye Loong Keoh:
Deployment of Facial Recognition Models at the Edge: A Feasibility Study. APNOMS 2020: 214-219 - [c31]Xin Xin, Sye Loong Keoh, Michele Sevegnani, Martin Saerbeck:
Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications. SmartIoT 2020: 43-50
2010 – 2019
- 2019
- [c30]Terence Ching Yang Lam, Sherlyn Shi Ling Yew, Sye Loong Keoh:
Bluetooth Mesh Networking: An Enabler of Smart Factory Connectivity and Management. APNOMS 2019: 1-6 - [c29]Zi Ee Lee, Raphael Liang Hui Chua, Sye Loong Keoh, Yoshihiro Ohba:
Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications. GLOBECOM 2019: 1-6 - [c28]Sydneyanata Gunady, Sye Loong Keoh:
A Non-GPS based Location Tracking of Public Buses using Bluetooth Proximity Beacons. WF-IoT 2019: 606-611 - 2018
- [c27]Joshua Ng, Sye Loong Keoh, Zhaohui Tang, Hajoon Ko:
SEABASS: Symmetric-keychain encryption and authentication for building automation systems. WF-IoT 2018: 219-224 - [c26]Heng Chuan Tan, Kelvin Lim, Sye Loong Keoh, Zhaohui Tang, David Leong, Chin-Sean Sum:
Chameleon: A blind double trapdoor hash function for securing AMI data aggregation. WF-IoT 2018: 225-230 - [c25]Bing Shun Lim, Sye Loong Keoh, Vrizlynn L. L. Thing:
Autonomous vehicle ultrasonic sensor vulnerability and impact assessment. WF-IoT 2018: 231-236 - [e1]Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy H. Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley L. Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - 2017
- [c24]Hajoon Ko, Jiong Jin, Sye Loong Keoh:
ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. CPSS@AsiaCCS 2017: 69-80 - [c23]Ming Hong Chia, Sye Loong Keoh, Zhaohui Tang:
Secure Data Provenance in Home Energy Monitoring Networks. ICSS 2017: 7-14 - 2016
- [j7]Aqeel Raza Syed, Kok-Lim Alvin Yau, Junaid Qadir, Hafizal Mohamad, Nordin Bin Ramli, Sye Loong Keoh:
Route Selection for Multi-Hop Cognitive Radio Networks Using Reinforcement Learning: An Experimental Study. IEEE Access 4: 6304-6324 (2016) - [j6]Hajoon Ko, Jiong Jin, Sye Loong Keoh:
Secure Service Virtualization in IoT by Dynamic Service Dependency Verification. IEEE Internet Things J. 3(6): 1006-1014 (2016) - [c22]Winwin Loon Haw Lim, Joe Tuck Wai Lum, Ian Jer Wei Yeo, Sye Loong Keoh:
A crowd-assisted real-time public transport information service: No more endless wait. PerCom Workshops 2016: 1-6 - [c21]Xiangwei Yin, Sye Loong Keoh:
Personalized ambience: An integration of learning model and intelligent lighting control. WF-IoT 2016: 666-671 - 2015
- [c20]Sye Loong Keoh, Yi Han Ang, Zhaohui Tang:
A lightweight privacy-preserved spatial and temporal aggregation of energy data. IAS 2015: 1-6 - [c19]Wen Bing Chuan, Shu Qin Ren, Sye Loong Keoh, Khin Mi Mi Aung:
Flexible Yet Secure De-duplication Service for Enterprise Data on Cloud Storage. ICCCRI 2015: 37-44 - 2014
- [j5]Sye Loong Keoh, Sandeep S. Kumar, Hannes Tschofenig:
Securing the Internet of Things: A Standardization Perspective. IEEE Internet Things J. 1(3): 265-275 (2014) - [c18]Sye Loong Keoh, Zhaohui Tang:
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. IAS 2014: 6-11 - 2013
- [c17]Francisco Vidal-Meca, Jan Henrik Ziegeldorf, Pedro Moreno-Sanchez, Oscar García Morchon, Sandeep S. Kumar, Sye Loong Keoh:
HIP Security Architecture for the IP-Based Internet of Things. AINA Workshops 2013: 1331-1336 - [c16]Amit Soni, Sye Loong Keoh, Sandeep S. Kumar, Oscar García Morchon:
HADA: Hybrid Access Decision Architecture for Building Automation and Control Systems. ICS-CSR 2013 - [c15]Oscar García Morchon, Sye Loong Keoh, Sandeep S. Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca, Jan Henrik Ziegeldorf:
Securing the IP-based internet of things with HIP and DTLS. WISEC 2013: 119-124 - 2012
- [c14]Martina Brachmann, Sye Loong Keoh, Oscar García Morchon, Sandeep S. Kumar:
End-to-End Transport Security in the IP-Based Internet of Things. ICCCN 2012: 1-5 - 2011
- [j4]Sye Loong Keoh:
Marlin: toward seamless content sharing and rights management. IEEE Commun. Mag. 49(11): 174-180 (2011) - [j3]Tobias Heer, Oscar García Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, Klaus Wehrle:
Security Challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 61(3): 527-542 (2011) - [c13]Sye Loong Keoh:
Efficient Group Key Management and Authentication for Body Sensor Networks. ICC 2011: 1-6
2000 – 2009
- 2009
- [j2]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil C. Lupu:
A lightweight policy system for body sensor networks. IEEE Trans. Netw. Serv. Manag. 6(3): 137-148 (2009) - [c12]Sye Loong Keoh, Koen Vrielink:
An implementation experience of domain management in marlin. Digital Rights Management Workshop 2009: 29-38 - [c11]Sye Loong Keoh, Emil C. Lupu, Morris Sloman:
Securing Body Sensor Networks: Sensor Association and Key Management. PerCom 2009: 1-6 - [c10]Yanmin Zhu, Morris Sloman, Emil Lupu, Sye Loong Keoh:
Vesta: A secure and autonomic system for pervasive healthcare. PervasiveHealth 2009: 1-8 - 2008
- [j1]Emil Lupu, Naranker Dulay, Morris Sloman, Joseph S. Sventek, Steven Heeps, Stephen D. Strowes, Kevin P. Twidle, Sye Loong Keoh, Alberto E. Schaeffer Filho:
AMUSE: autonomic management of ubiquitous e-Health systems. Concurr. Comput. Pract. Exp. 20(3): 277-295 (2008) - [c9]Alberto E. Schaeffer Filho, Emil Lupu, Morris Sloman, Sye Loong Keoh, Jorge Lobo, Seraphin B. Calo:
A Role-Based Infrastructure for the Management of Dynamic Communities. AIMS 2008: 1-14 - [c8]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lupu, Naranker Dulay, Nat Pryce:
An Efficient Policy System for Body Sensor Networks. ICPADS 2008: 383-390 - [c7]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lupu, Yu Zhang, Naranker Dulay, Nathaniel Pryce:
Finger: An efficient policy system for body sensor networks. MASS 2008: 428-433 - 2007
- [c6]Sye Loong Keoh, Kevin P. Twidle, Nathaniel Pryce, Alberto E. Schaeffer Filho, Emil Lupu, Naranker Dulay, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joe Sventek, Eleftheria Katsiri:
Policy-based Management for Body-Sensor Networks. BSN 2007: 92-98 - [c5]Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P. Twidle, Alberto E. Schaeffer Filho, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joseph S. Sventek:
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks. MobiQuitous 2007: 1-5 - [c4]Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker Dulay, Sye Loong Keoh, Kevin P. Twidle, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joe Sventek:
Towards Supporting Interactions between Self-Managed Cells. SASO 2007: 224-236 - 2005
- [b1]Sye Loong Keoh:
A policy-based security framework for ad-hoc networks. Imperial College London, UK, 2005 - [c3]Sye Loong Keoh, Emil Lupu:
An Efficient Access Control Model for Mobile Ad-Hoc Communities. SPC 2005: 210-224 - 2004
- [c2]Sye Loong Keoh, Emil Lupu, Morris Sloman:
PEACE: A Policy-Based Establishment of Ad-hoc Communities. ACSAC 2004: 386-395 - 2002
- [c1]Sye Loong Keoh, Emil Lupu:
Towards flexible credential verification in mobile ad-hoc networks. POMC 2002: 58-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint