Mooi Choo Chuah

Orcid: 0000-0002-0117-0621

Affiliations:
  • Lehigh University, Bethlehem, PA, USA


According to our database1, Mooi Choo Chuah authored at least 114 papers between 1990 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to wireless network system and protocol design".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CrackNex: a Few-shot Low-light Crack Segmentation Model Based on Retinex Theory for UAV Inspections.
CoRR, 2024

2023
Robustness of Trajectory Prediction Models Under Map-Based Attacks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

2022
A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes.
IEEE/ACM Trans. Netw., 2022

UCTNet: Uncertainty-Aware Cross-Modal Transformer Network for Indoor RGB-D Semantic Segmentation.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Weakly-supervised Object Representation Learning for Few-shot Semantic Segmentation.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2021

SRNet: Spatial Relation Network for Efficient Single-stage Instance Segmentation in Videos.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

2020
Signature Verification Using Critical Segments for Securing Mobile Transactions.
IEEE Trans. Mob. Comput., 2020

M&M: Deep learning aided multi-facet mental health support tool for College Students.
Proceedings of the HealthDL@MobiSys 2020, 2020

Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
DAC: Data-Free Automatic Acceleration of Convolutional Networks.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2019

GRIP: Graph-based Interaction-aware Trajectory Prediction.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Deep-Learning-Based Network Intrusion Detection for SCADA Systems.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Generalized Minimax: A Self-Enforcing Pricing Scheme for Load Aggregators.
IEEE Trans. Smart Grid, 2018

Device-free Personalized Fitness Assistant Using WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

ReHAR: Robust and Efficient Human Activity Recognition.
Proceedings of the 2018 IEEE Winter Conference on Applications of Computer Vision, 2018

LiveFace: A Multi-task CNN for Fast Face-Authentication.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Recurrent Neural Networks Based Obesity Status Prediction Using Activity Data.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Detecting Payload Attacks on Programmable Logic Controllers (PLCs).
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

A Strawberry Detection System Using Convolutional Neural Networks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Deep Learning Based Medical Diagnosis System Using Multiple Data Sources.
Proceedings of the 2018 ACM International Conference on Bioinformatics, 2018

2017
Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching.
IEEE Trans. Dependable Secur. Comput., 2017

WiFi-Enabled Smart Human Dynamics Monitoring.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

LILI Version2: A Low-Cost Robot that Tells Interactive Stories and Recognizes Objects.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

CASHEIRS: Cloud assisted scalable hierarchical encrypted based image retrieval system.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Automatic Generation and Recommendation for API Mashups.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

SBGAR: Semantics Based Group Activity Recognition.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Incentivising High Quality Crowdsourcing Clinical Data for Disease Prediction.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
Accurate Image Retrieval with Unsupervised 2-Stage k-NN Re-Ranking.
Int. J. Multim. Data Eng. Manag., 2016

Detecting Peer-to-Peer Botnets in SCADA Systems.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

DeepCham: Collaborative Edge-Mediated Adaptive Deep Learning for Mobile Object Recognition.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

Evaluation of utility-privacy trade-offs of data manipulation techniques for smart metering.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS).
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems.
IEEE Trans. Mob. Comput., 2015

Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones.
Ad Hoc Sens. Wirel. Networks, 2015

Online Visual Tracking Using Temporally Coherent Part Cluster.
Proceedings of the 2015 IEEE Winter Conference on Applications of Computer Vision, 2015

Cuckoo-Filter Based Privacy-Aware Search over Encrypted Cloud Data.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

EMOD: an efficient on-device mobile visual search system.
Proceedings of the 6th ACM Multimedia Systems Conference, 2015

Dense Optical Flow Based Emotion Recognition Classifier.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

A Novel Unsupervised 2-Stage k-NN Re-Ranking Algorithm for Image Retrieval.
Proceedings of the 2015 IEEE International Symposium on Multimedia, 2015

Category-Blind Human Action Recognition: A Practical Recognition System.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

Critical segment based real-time E-signature for securing mobile transactions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
IEEE Trans. Wirel. Commun., 2014

Panel: future trends and research issues in mobile augmented reality.
Proceedings of the 2014 Workshop on Mobile Augmented Reality and Robotic Technology-Based Systems, 2014

Demo: lehigh explorer augmented campus tour (LACT).
Proceedings of the 2014 Workshop on Mobile Augmented Reality and Robotic Technology-Based Systems, 2014

Lehigh Instrument for Learning Interaction (LILI): An Interactive Robot to Aid Development of Social Skills for Autistic Children.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

LAAR: Long-Range Radio Assisted Ad-Hoc Routing in MANETs.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
Defending against Unidentifiable Attacks in Electric Power Grids.
IEEE Trans. Parallel Distributed Syst., 2013

Smartphone based user verification leveraging gait recognition for mobile healthcare systems.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Lehigh Explorer: A Real Time Video Streaming Application with Mobility Support for Content Centric Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

EMOVIS: An Efficient Mobile Visual Search System for Landmark Recognition.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

SCOM: A Scalable Content Centric Network Architecture with Mobility Support.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Towards self-healing smart grid via intelligent local controller switching under jamming.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Performance Evaluation of Dissemination Schemes for Coded Packets in Heterogeneous Sparse Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2012

Scalable Keyword-Based Data Retrievals in Future Content-Centric Networks.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

Social closeness based clone attack detection for mobile healthcare system.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Unidentifiable Attacks in Electric Power Systems.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

Incentive driven information sharing in delay tolerant mobile networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Gateway-based interdomain routing scheme for intentional named message delivery in Disruption Tolerant Networks.
Proceedings of the MILCOM 2011, 2011

Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching.
Proceedings of the Global Communications Conference, 2011

Secure Content Centric Mobile Network.
Proceedings of the Global Communications Conference, 2011

Detection and Classification of Different Botnet C&C Channels.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
Detecting wormhole attacks in delay-tolerant networks.
IEEE Wirel. Commun., 2010

A social community based approach for reducing the propagation of infectious diseases in healthcare.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Cooperative Multichannel MAC (COMMAC) for Cognitive Radio Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Cooperative User Centric Information Dissemination in Human Content-Based Networks.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2009
Context-aware multicast routing scheme for Disruption Tolerant Networks.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Performance comparison of different multicast routing strategies in disruption tolerant networks.
Comput. Commun., 2009

An encounter-based multicast scheme for disruption tolerant networks.
Comput. Commun., 2009

Performance evaluations of data-centric information retrieval schemes for DTNs.
Comput. Networks, 2009

How Mobility Models Affect the Design of Network Coding Schemes for Disruption Tolerant Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Identifying Connectors and Communities: Understanding Their Impacts on the Performance of a DTN Publish/Subscribe System.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Syntax vs. semantics: competing approaches to dynamic network intrusion detection.
Int. J. Secur. Networks, 2008

Performance evaluation of node density-based adaptive routing scheme for disruption tolerant networks.
Int. J. Ad Hoc Ubiquitous Comput., 2008

Efficient Interdomain Multicast Delivery in Disruption Tolerant Networks.
Proceedings of the MSN 2008, 2008

Opportunistic information distribution in challenged networks.
Proceedings of the Third Workshop on Challenged Networks, CHANTS 2008, San Francisco, 2008

Performance evaluation of an encountered based multicast scheme for disruption tolerant networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

2007
Performance Evaluation of a Power Management Scheme for Disruption Tolerant Network.
Mob. Networks Appl., 2007

Integrated Buffer and Route Management in a DTN with Message Ferry.
J. Inf. Sci. Eng., 2007

A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

SHIM: a scalable hierarchical inter-domain multicast approach for disruption tolerant networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

ECG Anomaly Detection via Time Series Analysis.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Performance Evaluations of Various Message Ferry Scheduling Schemes with Two Traffic Classes.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks.
IEEE Trans. Dependable Secur. Comput., 2006

Performance evaluation of mobility management scheme in DTN.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

OS-multicast: On-demand Situation-aware Multicasting in Disruption Tolerant Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Store-and-Forward Performance in a DTN.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Performance Study of Robust Data Transfer Protocol for VANETs.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Detecting Selective Dropping Attacks in BGP.
Proceedings of the LCN 2006, 2006

Network intrusion detection with semantics-aware capability.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

The Strength of Syntax Based Approaches to Dynamic Network Intrusion Detection.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Message Ferrying for Constrained Scenarios.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Comparisons of Inter-Domain Routing Schemes for Heterogeneous Ad Hoc Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Performance of UMTS code sharing algorithms in the presence of mixed Web, email and FTP traffic.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Enhanced disruption and fault tolerant network architecture for bundle delivery (EDIFY).
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Guest Editorial: Multimedia multicast/broadcast services in 3G/4G networks.
IEEE Commun. Mag., 2004

PacketScore: Statistical-based overload control against Distributed Denial-of-Service Attacks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Transient performance of PacketScore for blocking DDoS attacks.
Proceedings of IEEE International Conference on Communications, 2004

UMTS Release 99/4 airlink enhancement for supporting MBMS services.
Proceedings of IEEE International Conference on Communications, 2004

2003
Impact of rate control on the capacity of an Iub link: multiple service case.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Impact of rate control on the capacity of an Iub link: single service case.
Proceedings of IEEE International Conference on Communications, 2003

2002
Quality of service in third-generation IP-based radio access networks.
Bell Labs Tech. J., 2002

Impacts of inactivity timer values on UMTS system capacity.
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002

2000
Transport delays for UMTS VoIP.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

1999
Mobile virtual private dial-up services.
Bell Labs Tech. J., 1999

Access priority schemes in UMTS MAC.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

1997
Link Layer Retransmission Schemes for Circuit-Mode Sata Over the CDMA Physical Channel.
Mob. Networks Appl., 1997

1994
Analysis of networks of queues via projection techniques.
IEEE Trans. Autom. Control., 1994

A Hybrid Approach to Address Normalization.
IEEE Expert, 1994

1990
Approximate Analysis of Average Performance of (sigma, rho) Regulators.
Proceedings of the Proceedings IEEE INFOCOM '90, 1990


  Loading...