Kok-Seng Wong

Orcid: 0000-0002-2029-7644

According to our database1, Kok-Seng Wong authored at least 49 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FedDCT: Federated Learning of Large Convolutional Neural Networks on Resource-Constrained Devices Using Divide and Collaborative Training.
IEEE Trans. Netw. Serv. Manag., February, 2024

Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions.
Eng. Appl. Artif. Intell., January, 2024

Efficiently Assemble Normalization Layers and Regularization for Federated Domain Generalization.
CoRR, 2024

Towards Efficient Communication Federated Recommendation System via Low-rank Training.
CoRR, 2024

2023
Synthesizing Physical Backdoor Datasets: An Automated Framework Leveraging Deep Generative Models.
CoRR, 2023

Fooling the Textual Fooler via Randomizing Latent Representations.
CoRR, 2023

Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks.
CoRR, 2023

An Empirical Study of Federated Learning on IoT-Edge Devices: Resource Allocation and Heterogeneity.
CoRR, 2023

FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients Inspection.
CoRR, 2023

Backdoor Attacks and Defenses in Federated Learning: Survey, Challenges and Future Research Directions.
CoRR, 2023

Personalized Privacy-Preserving Framework for Cross-Silo Federated Learning.
CoRR, 2023

IBA: Towards Irreversible Backdoor Attacks in Federated Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients Inspection.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling.
Inf. Secur. J. A Glob. Perspect., 2022

FedDCT: Federated Learning of Large Convolutional Neural Networks on Resource Constrained Devices using Divide and Co-Training.
CoRR, 2022

Toward Efficient Hierarchical Federated Learning Design Over Multi-Hop Wireless Communications Networks.
IEEE Access, 2022

Few-Shot Learning based on Residual Neural Networks for X-ray Image Classification.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Emerging Privacy and Trust Issues for Autonomous Vehicle Systems.
Proceedings of the International Conference on Information Networking, 2022

A Survey on Deep Learning Advances and Emerging Issues in Pneumonia and COVID19 Prediction.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2022

2021
Toward forecasting future day air pollutant index in Malaysia.
J. Supercomput., 2021

Toward efficient and intelligent video analytics with visual privacy protection for large-scale surveillance.
J. Supercomput., 2021

Efficient Two-Party Integer Comparison With Block Vectorization Mechanism.
IEEE Access, 2021

2020
Distributed Feature Extraction on Apache Spark for Human Action Recognition.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

Enhancing the Adaptiveness of Gaussian Process Regression based on Power Spectral Density.
Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication, 2020

A Privacy-Preserving Framework for Surveillance Systems.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2019
Virtual machine placement with (m, n)-fault tolerance in cloud data center.
Clust. Comput., 2019

A Privacy-Preserving Coalition Loyalty Program.
Proceedings of the 2019 IEEE SmartWorld, 2019

Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

2018
Service Migration in Mobile Edge Computing.
Wirel. Commun. Mob. Comput., 2018

Toward a fair indictment for sealed-bid auction with self-enforcing privacy.
J. Supercomput., 2018

Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system.
J. Intell. Fuzzy Syst., 2018

Emerging issues and challenges for cloud data at the edge.
Int. J. Web Grid Serv., 2018

2017
Privacy Protection for Data-Driven Smart Manufacturing Systems.
Int. J. Web Serv. Res., 2017

Skyline service selection approach based on QoS prediction.
Int. J. Web Grid Serv., 2017

Secure rank correlation computation for IoT applications.
Int. J. Serv. Technol. Manag., 2017

Network failure-aware redundant virtual machine placement in a cloud data center.
Concurr. Comput. Pract. Exp., 2017

2016
An enhanced user authentication solution for mobile payment systems using wearables.
Secur. Commun. Networks, 2016

2015
Towards a respondent-preferred k i -anonymity model.
Frontiers Inf. Technol. Electron. Eng., 2015

Secure Two-Party Rank Correlation Computations for Recommender Systems.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
On private Hamming distance computation.
J. Supercomput., 2014

Towards Self-Awareness Privacy Protection for Internet of Things Data Collection.
J. Appl. Math., 2014

Privacy-Preserving Data Collection with Self-Awareness Protection.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Privacy-preserving similarity coefficients for binary data.
Comput. Math. Appl., 2013

Secure Re-publication of Dynamic Big Data.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Privacy-preserving frequent itemsets mining via secure collaborative framework.
Secur. Commun. Networks, 2012

A Privacy-Preserving Biometric Matching Protocol for Iris Codes Verification.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Secure Biometric-Based Authentication for Cloud Computing.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

Towards Biometric-based Authentication for Cloud Computing.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2010
Semi-trusted Collaborative Framework for Multi-party Computation.
KSII Trans. Internet Inf. Syst., 2010


  Loading...