Kang-Leng Chiew

Orcid: 0000-0002-0007-2608

Affiliations:
  • Universiti Malaysia Sarawak, Faculty of Computer Science and Information Technology


According to our database1, Kang-Leng Chiew authored at least 21 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Hybrid phishing detection using joint visual and textual identity.
Expert Syst. Appl., June, 2023

2020
A graph-theoretic approach for the detection of phishing webpages.
Comput. Secur., 2020

2019
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system.
Inf. Sci., 2019

Incoming Work-In-Progress Prediction in Semiconductor Fabrication Foundry Using Long Short-Term Memory.
Comput. Intell. Neurosci., 2019

2018
Leverage Website Favicon to Detect Phishing Websites.
Secur. Commun. Networks, 2018

A survey of phishing attacks: Their types, vectors and technical approaches.
Expert Syst. Appl., 2018

2016
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder.
Decis. Support Syst., 2016

2015
Utilisation of website logo for phishing detection.
Comput. Secur., 2015

EFA for structure detection in image data.
Proceedings of the 9th International Conference on IT in Asia, 2015

Phishing email detection technique by using hybrid features.
Proceedings of the 9th International Conference on IT in Asia, 2015

2014
Phishing website detection using URL-assisted brand name weighting system.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Phishing Detection via Identification of Website Identity.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
An Insertion Heuristic Manpower Scheduling for In-Flight Catering Service Application.
Proceedings of the Computational Logistics - Third International Conference, 2012

2010
Identifying Steganographic Payload Location in Binary Image.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.
Proceedings of the Information Security, 2010

Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography.
Proceedings of the ARES 2010, 2010

Blind Steganalysis: A Countermeasure for Binary Image Steganography.
Proceedings of the ARES 2010, 2010

2008
Steganography: DCT Coefficients Reparation Technique in JPEG Image.
J. Digit. Content Technol. its Appl., 2008

Features-Pooling Blind JPEG Image Steganalysis.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2008

2003
Shape Feature Representation for Content Based Image Retrieval.
Proceedings of the 3th International Conference on IT in Asia, 2003


  Loading...