default search action
Wee Keong Ng
Person information
- affiliation: Nanyang Technological University, Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j50]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design. Internet Things 25: 101077 (2024) - [c177]Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Wee Keong Ng, Kasun De Zoysa:
SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace. CCNC 2024: 439-445 - 2023
- [c176]Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Wee Keong Ng, D. N. Ranasinghe, Kasun De Zoysa:
Proof-of-Pedal - Pedal-Powered Byzantine Green Consensus for Blockchain. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2023: 810-814 - 2022
- [c175]Huafei Zhu, Wee Keong Ng:
Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol. AINA (3) 2022: 492-503 - [c174]Huafei Zhu, Wee Keong Ng:
Highly Scalable Beaver Triple Generator from Additively Homomorphic Encryption. AINA (3) 2022: 504-514 - [c173]Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Peter Foytik, Xueping Liang, Wee Keong Ng:
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace. MILCOM 2022: 559-564 - [c172]Eranga Bandara, Xueping Liang, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Wee Keong Ng:
Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing. SECON 2022: 109-117 - [i5]Vasily Sidorov, Ethan Yi Fan Wei, Wee Keong Ng:
Comprehensive Performance Analysis of Homomorphic Cryptosystems for Practical Data Processing. CoRR abs/2202.02960 (2022) - 2021
- [c171]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
Promize - Blockchain and Self Sovereign Identity Empowered Mobile ATM Platform. SAI (2) 2021: 891-911 - [i4]Jenn-Bing Ong, Wee Keong Ng, Ivan Tjuawinata, Chao Li, Jielin Yang, Sai None Myne, Huaxiong Wang, Kwok-Yan Lam, C.-C. Jay Kuo:
Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation. CoRR abs/2101.04194 (2021) - 2020
- [j49]Muhammad Ali Masood, Rabeeh Ayaz Abbasi, Wee Keong Ng:
Context-Aware Sliding Window for Sentiment Classification. IEEE Access 8: 4870-4884 (2020) - [j48]Huafei Zhu, Rick Siow Mong Goh, Wee Keong Ng:
Privacy-Preserving Weighted Federated Learning Within the Secret Sharing Framework. IEEE Access 8: 198275-198284 (2020) - [c170]Eranga Bandara, Xueping Liang, Sachin Shetty, Wee Keong Ng, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa, Bård Langöy, David Larsson:
Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems. ICBC 2020: 169-184 - [c169]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Crissie Hall, Daniel Bowden, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
Connect - Blockchain and Self-Sovereign Identity Empowered Contact Tracing Platform. MobiHealth 2020: 208-223 - [c168]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
SaaS - Microservices-Based Scalable Smart Contract Architecture. SSCC 2020: 228-243
2010 – 2019
- 2019
- [c167]Shantanu Sharma, Wee Keong Ng:
Scalable, On-Demand Secure Multiparty Computation for Privacy-Aware Blockchains. BlockSys 2019: 196-211 - [c166]Eranga Bandara, Wee Keong Ng, Nalin Ranasinghe, Kasun De Zoysa:
Aplos: Smart Contracts Made Smart. BlockSys 2019: 431-445 - [c165]Huafei Zhu, Wee Keong Ng:
Transitive Pseudonyms Mediated EHRs Sharing for Very Important Patients. ICWS 2019: 80-94 - 2018
- [j47]Huynh Ngoc Anh, Wee Keong Ng, Kanishka Ariyapala:
Learning under concept drift with follow the regularized leader and adaptive decaying proximal. Expert Syst. Appl. 96: 49-63 (2018) - [c164]Eranga Bandara, Wee Keong Ng, Kasun De Zoysa, Newton Fernando, Supun Tharaka, P. Maurakirinathan, Namal Jayasuriya:
Mystiko - Blockchain Meets Big Data. IEEE BigData 2018: 3024-3032 - [c163]Vasily Sidorov, Wee Keong Ng, Mohamed Faisal Bin Mohamed Salleh:
A Practical Expert System with (Near) Real-Time Analysis of Large Spatial Sets of Air Traffic Data. IEEE BigData 2018: 3478-3484 - [c162]Andrew Putra Kusuma, Vajisha U. Wanniarachchi, Owen Noel Newton Fernando, Wee Keong Ng:
Audio Fingerprint Application for the Media Industry. UbiComp/ISWC Adjunct 2018: 114-117 - [c161]Huafei Zhu, Wee Keong Ng:
Sustainable Data Management Strategies and Systems in Untrust Cloud Environments. ICIT 2018: 163-167 - [i3]Ziji Shi, Wee Keong Ng:
A Collision-Free Path Planning Algorithm for Unmanned Aerial Vehicle Delivery. CoRR abs/1805.03358 (2018) - [i2]Jenn-Bing Ong, Wee Keong Ng, C.-C. Jay Kuo:
Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition. CoRR abs/1812.02622 (2018) - 2017
- [c160]Jenn-Bing Ong, Wee Keong Ng:
Hybrid Subspace Mixture Models for Prediction and Anomaly Detection in High Dimensions. ADMA 2017: 326-339 - [c159]Huynh Ngoc Anh, Wee Keong Ng, Kanishka Ariyapala:
A New Adaptive Learning Algorithm and Its Application to Online Malware Detection. DS 2017: 18-32 - [c158]Hoang Giang Do, Wee Keong Ng:
Blockchain-Based System for Secure Data Storage with Private Keyword Search. SERVICES 2017: 90-93 - [c157]Sharath Chandra Guntuku, Weisi Lin, Jordan Carpenter, Wee Keong Ng, Lyle H. Ungar, Daniel Preotiuc-Pietro:
Studying Personality through the Content of Posted and Liked Images on Twitter. WebSci 2017: 223-227 - 2016
- [c156]Kanishka Ariyapala, Hoang Giang Do, Huynh Ngoc Anh, Wee Keong Ng, Mauro Conti:
A Host and Network Based Intrusion Detection for Android Smartphones. AINA Workshops 2016: 849-854 - [c155]Hoang Giang Do, Wee Keong Ng:
Privacy-Preserving Triangle Counting in Distributed Graphs. AINA 2016: 917-924 - [c154]Divya Rao, Wee Keong Ng:
A Method to Price Your Information Asset in the Information Market. BigData Congress 2016: 307-314 - [c153]Divya Rao, Wee Keong Ng:
Monetizing the User's Information Asset in Internet Information Market. BigData Congress 2016: 337-340 - [c152]Vasily Sidorov, Wee Keong Ng:
Towards Performance Evaluation of Oblivious Data Processing Emulated with Partially Homomorphic Encryption Schemes. BigDataSecurity/HPSC/IDS 2016: 113-115 - [c151]Divya Rao, Wee Keong Ng:
A User-Centric Approach to Pricing Information. BigDataService 2016: 202-209 - [c150]Vasily Sidorov, Wee Keong Ng:
A Confidentiality-Preserving Search Technique for Encrypted Relational Cloud Databases. BigDataService 2016: 244-251 - [c149]Divya Rao, Wee Keong Ng:
Information Pricing: A Utility Based Pricing Mechanism. DASC/PiCom/DataCom/CyberSciTech 2016: 754-760 - [c148]Thanh Nghia Ho, Wee Keong Ng:
Application of Stylometry to DarkWeb Forum User Identification. ICICS 2016: 173-183 - [c147]Hoang Giang Do, Wee Keong Ng:
Private Boolean Query Processing on Encrypted Data. ICICS 2016: 321-332 - [c146]Huynh Ngoc Anh, Wee Keong Ng, Hoang Giang Do:
On periodic behavior of malware: experiments, opportunities and challenges. MALWARE 2016: 85-92 - [c145]Duc H. Tran, Wee Keong Ng, Y. D. Wong, Vinh V. Thai:
Incremental Privacy-Preserving Association Rule Mining Using Negative Border. PAISI 2016: 87-100 - [c144]Hoang Giang Do, Wee Keong Ng:
Multidimensional range query on outsourced database with strong privacy guarantee. PST 2016: 555-560 - [c143]Sharath Chandra Guntuku, Sujoy Roy, Weisi Lin, Kelvin Ng, Wee Keong Ng, Vinit Jakhetiya:
Personalizing User Interfaces for improving quality of experience in VoD recommender systems. QoMEX 2016: 1-6 - [c142]Divya Rao, Wee Keong Ng:
Information Pricing - A User-Data Centric Method to Price Information. SERVICES 2016: 146-149 - [c141]Huynh Ngoc Anh, Wee Keong Ng, Alex Ulmer, Jörn Kohlhammer:
Uncovering periodic network signals of cyber attacks. VizSEC 2016: 1-8 - 2015
- [j46]Hai-Long Nguyen, Yew-Kwong Woon, Wee Keong Ng:
A survey on data stream clustering and classification. Knowl. Inf. Syst. 45(3): 535-569 (2015) - [c140]Fang Liu, Wee Keong Ng, Wei Zhang:
Encrypted SVM for Outsourced Data Mining. CLOUD 2015: 1085-1092 - [c139]Fang Liu, Wee Keong Ng, Wei Zhang:
Encrypted Gradient Descent Protocol for Outsourced Data Mining. AINA 2015: 339-346 - [c138]Fang Liu, Wee Keong Ng, Wei Zhang:
Encrypted Association Rule Mining for Outsourced Data Mining. AINA 2015: 550-557 - [c137]Divya Rao, Wee Keong Ng:
How much is your information worth - A method for revenue generation for your information. IEEE BigData 2015: 2320-2326 - [c136]Divya Rao, Wee Keong Ng:
How to make money from your information and keep your privacy. IEEE BigData 2015: 2859-2861 - [c135]Fang Liu, Wee Keong Ng, Wei Zhang:
Secure Scalar Product for Big-Data in MapReduce. BigDataService 2015: 120-129 - [c134]Hoang Giang Do, Wee Keong Ng:
Privacy-preserving approach for sharing and processing intrusion alert data. ISSNIP 2015: 1-6 - [c133]Vasily Sidorov, Wee Keong Ng:
Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solution. SERVICES 2015: 221-228 - 2014
- [j45]Shukai Li, Whye Loon Tung, Wee Keong Ng:
A novelty detection machine and its application to bank failure prediction. Neurocomputing 130: 63-72 (2014) - [j44]Hai-Long Nguyen, Wee Keong Ng, Yew-Kwong Woon:
Closed motifs for streaming time series classification. Knowl. Inf. Syst. 41(1): 101-125 (2014) - [c132]Fang Liu, Wee Keong Ng, Wei Zhang:
Encrypted Scalar Product Protocol for Outsourced Data Mining. IEEE CLOUD 2014: 336-343 - [c131]Vasily Sidorov, Wee Keong Ng:
Model of an Encrypted Cloud Relational Database Supporting Complex Predicates in WHERE Clause. IEEE CLOUD 2014: 667-672 - [c130]Vivek Balachandran, Wee Keong Ng, Sabu Emmanuel:
Function Level Control Flow Obfuscation for Software Security. CISIS 2014: 133-140 - [c129]Fang Liu, Wee Keong Ng, Wei Zhang, Do Hoang Giang, Shuguo Han:
Encrypted Set Intersection Protocol for Outsourced Datasets. IC2E 2014: 135-140 - [c128]Hoang Giang Do, Wee Keong Ng:
Secure reachability query on private shared graphs. ISSNIP 2014: 1-6 - [c127]Vivek Balachandran, Sabu Emmanuel, Wee Keong Ng:
Obfuscation by code fragmentation to evade reverse engineering. SMC 2014: 463-469 - 2013
- [j43]Wei Zha, Wee Keong Ng:
Prolonging Lifespan of Sensor Networks Using Redundant Nodes. Ad Hoc Sens. Wirel. Networks 19(1-2): 1-19 (2013) - [j42]Shukai Li, Wee Keong Ng:
Maximum Volume Outlier Detection and its Applications in Credit Risk Analysis. Int. J. Artif. Intell. Tools 22(5) (2013) - [j41]Hock Hee Ang, Vivekanand Gopalkrishnan, Steven C. H. Hoi, Wee Keong Ng:
Classification in P2P networks with cascade support vector machines. ACM Trans. Knowl. Discov. Data 7(4): 20:1-20:29 (2013) - [j40]Hai-Long Nguyen, Wee Keong Ng, Yew-Kwong Woon:
Concurrent Semi-supervised Learning with Active Learning of Data Streams. Trans. Large Scale Data Knowl. Centered Syst. 8: 113-136 (2013) - [c126]Vasily Sidorov, Wee Keong Ng:
Complex Queries in a Shared Multi User Relational Cloud Database. IEEE CLOUD 2013: 903-909 - [c125]Hoang Giang Do, Wee Keong Ng, Zhendong Ma:
Privacy-Preserving Social Network for an Untrusted Server. CGC 2013: 472-478 - [c124]Rui-ping Lua, Wee Keong Ng:
Autonomic swarms for regenerative and collaborative networking. CollaborateCom 2013: 40-49 - 2012
- [j39]Lin Wang, Wee Keong Ng:
Hybrid solving algorithms for an extended dynamic constraint satisfaction problem based configuration system. Concurr. Eng. Res. Appl. 20(3): 223-236 (2012) - [c123]Chenggang Wang, Wee Keong Ng, Huaixin Chen:
From data to knowledge to action: A taxi business intelligence system. FUSION 2012: 1623-1628 - [c122]Lizi Zhang, Siwei Jiang, Jie Zhang, Wee Keong Ng:
Robustness of Trust Models and Combinations for Handling Unfair Ratings. IFIPTM 2012: 36-51 - [c121]Nguyen Thanh Hung, Do Hoang Giang, Wee Keong Ng, Huafei Zhu:
Cloud-enabled data sharing model. ISI 2012: 1-6 - [c120]Wei Zha, Wee Keong Ng:
Geographic Routing with Cross Links. KICSS 2012: 181-186 - [c119]Hai-Long Nguyen, Yew-Kwong Woon, Wee Keong Ng, Li Wan:
Heterogeneous Ensemble for Feature Drifts in Data Streams. PAKDD (2) 2012: 1-12 - [c118]Wee Keong Ng, Yonggang Wen, Huafei Zhu:
Private data deduplication protocols in cloud storage. SAC 2012: 441-446 - [c117]Wei Zha, Wee Keong Ng:
Privacy-preserving In-network Aggregation in Wireless Sensor Network. SENSORNETS 2012: 223-228 - 2011
- [j38]Lin Wang, Wee Keong Ng, Bin Song:
Extended DCSP Approach on Product Configuration with Cost Estimation. Concurr. Eng. Res. Appl. 19(2): 123-138 (2011) - [j37]Linhong Zhu, Wee Keong Ng, James Cheng:
Structure and attribute index for approximate graph matching in large graphs. Inf. Syst. 36(6): 958-972 (2011) - [c116]Duc H. Tran, Hai-Long Nguyen, Wei Zha, Wee Keong Ng:
Towards security in sharing data on cloud-based social networks. ICICS 2011: 1-5 - [c115]Linhong Zhu, Wee Keong Ng, Shuguo Han:
Classifying Graphs Using Theoretical Metrics: A Study of Feasibility. DASFAA Workshops 2011: 53-64 - [c114]Duc H. Tran, Wee Keong Ng, Hoon Wei Lim, Hai-Long Nguyen:
An Efficient Cacheable Secure Scalar Product Protocol for Privacy-Preserving Data Mining. DaWaK 2011: 354-366 - [c113]Hai-Long Nguyen, Wee Keong Ng, Yew-Kwong Woon, Duc H. Tran:
Concurrent Semi-supervised Learning of Data Streams. DaWaK 2011: 445-459 - [c112]Wei Zha, Wee Keong Ng:
Predict Energy Consumption of Trigger-Driven Sensor Network by Markov Chains. ICDCS Workshops 2011: 350-356 - [c111]Lizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang:
IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation. TrustCom 2011: 266-273 - [c110]Lizi Zhang, Cheun Pin Tan, Siyi Li, Hui Fang, Pramodh Rai, Yao Chen, Rohit Luthra, Wee Keong Ng, Jie Zhang:
The Influence of Interaction Attributes on Trust in Virtual Communities. UMAP Workshops 2011: 268-279 - 2010
- [j36]Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong Ng, Steven C. H. Hoi:
P2PDocTagger: Content management through automated P2P collaborative tagging. Proc. VLDB Endow. 3(2): 1601-1604 (2010) - [j35]Ramadhana Bramandia, Byron Choi, Wee Keong Ng:
Incremental Maintenance of 2-Hop Labeling of Large Graphs. IEEE Trans. Knowl. Data Eng. 22(5): 682-698 (2010) - [j34]Shuguo Han, Wee Keong Ng, Li Wan, Vincent C. S. Lee:
Privacy-Preserving Gradient-Descent Methods. IEEE Trans. Knowl. Data Eng. 22(6): 884-899 (2010) - [c109]Hock Hee Ang, Vivekanand Gopalkrishnan, Steven C. H. Hoi, Wee Keong Ng:
Adaptive Ensemble Classification in P2P Networks. DASFAA (1) 2010: 34-48 - [c108]Hock Hee Ang, Vivekanand Gopalkrishnan, Anwitaman Datta, Wee Keong Ng, Steven C. H. Hoi:
Satrap: Data and Network Heterogeneity Aware P2P Data-Mining. PAKDD (2) 2010: 63-70 - [c107]Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong Ng, Steven C. H. Hoi:
On Classifying Drifting Concepts in P2P Networks. ECML/PKDD (1) 2010: 24-39 - [c106]Murugan Ayyappan, Yew-Kwong Woon, Wee Keong Ng:
MICHO: a scalable constraint-based algorithm for learning Bayesian networks. SAC 2010: 985-989
2000 – 2009
- 2009
- [j33]Haifeng Liu, Vivekanand Gopalkrishnan, Thi Nhu Quynh Kim, Wee Keong Ng:
Regression models for estimating product life cycle cost. J. Intell. Manuf. 20(4): 401-408 (2009) - [j32]Li Wan, Wee Keong Ng, Xuan-Hong Dang, Philip S. Yu, Kuan Zhang:
Density-based clustering of data streams at multiple resolutions. ACM Trans. Knowl. Discov. Data 3(3): 14:1-14:28 (2009) - [c105]Linhong Zhu, Byron Choi, Bingsheng He, Jeffrey Xu Yu, Wee Keong Ng:
A Uniform Framework for Ad-Hoc Indexes to Answer Reachability Queries on Large Graphs. DASFAA 2009: 138-152 - [c104]Xuan-Hong Dang, Vincent C. S. Lee, Wee Keong Ng, Arridhana Ciptadi, Kok-Leong Ong:
An EM-Based Algorithm for Clustering Data Streams in Sliding Windows. DASFAA 2009: 230-235 - [c103]Xuan-Hong Dang, Vincent C. S. Lee, Wee Keong Ng, Kok-Leong Ong:
Incremental and Adaptive Clustering Stream Data over Sliding Window. DEXA 2009: 660-674 - [c102]Tiong-Thye Goh, Siddhartha Bose, Wee Keong Ng, Longbing Cao, Vincent C. S. Lee:
Editorial to the Proceedings of mobile technologies in enterprise computing systems workshop (MTECS 2009). EDOCW 2009: 138-139 - [c101]Shuguo Han, Wee Keong Ng, Philip S. Yu:
Privacy-Preserving Singular Value Decomposition. ICDE 2009: 1267-1270 - [c100]Lin Wang, Wee Keong Ng, Bing Song:
Constraint Satisfaction Approach on Product Configuration with Cost Estimation. IEA/AIE 2009: 731-740 - [c99]Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong Ng, Steven C. H. Hoi:
Communication-Efficient Classification in P2P Networks. ECML/PKDD (1) 2009: 83-98 - [r1]Xuan-Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vincent C. S. Lee:
Frequent Sets Mining in Data Stream Environments. Encyclopedia of Data Warehousing and Mining 2009: 901-906 - 2008
- [j31]Wee Keong Ng, Masaru Kitsuregawa, Jianzhong Li:
Editorial. Knowl. Inf. Syst. 14(2): 141-142 (2008) - [j30]Xuan-Hong Dang, Wee Keong Ng, Kok-Leong Ong:
Online mining of frequent sets in data streams with error guarantee. Knowl. Inf. Syst. 16(2): 245-258 (2008) - [c98]Hock Hee Ang, Vivekanand Gopalkrishnan, Steven C. H. Hoi, Wee Keong Ng, Anwitaman Datta:
Classification in P2P Networks by Bagging Cascade RSVMs. DBISP2P 2008: 13-25 - [c97]Shuguo Han, Wee Keong Ng:
Privacy-Preserving Linear Fisher Discriminant Analysis. PAKDD 2008: 136-147 - [c96]Hock Hee Ang, Vivekanand Gopalkrishnan, Steven C. H. Hoi, Wee Keong Ng:
Cascade RSVM in Peer-to-Peer Networks. ECML/PKDD (1) 2008: 55-70 - [c95]Shuguo Han, Wee Keong Ng:
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining. SDM 2008: 375-386 - [c94]Jashanjot Singh Sekhon, Vivekanand Gopalkrishnan, Wee Keong Ng:
Proportionate feature selection - A pre-processing step for clustering. SMC 2008: 2622-2627 - [c93]Ramadhana Bramandia, Byron Choi, Wee Keong Ng:
On incremental maintenance of 2-hop labeling of graphs. WWW 2008: 845-854 - 2007
- [j29]Wenyuan Li, Ying Liu, Hung-Chung Huang, Yanxiong Peng, Yongjing Lin, Wee Keong Ng, Kok-Leong Ong:
Dynamical Systems for Discovering Protein Complexes and Functional Modules from Biological Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 4(2): 233-250 (2007) - [j28]Wenyuan Li, Wee Keong Ng, Ying Liu, Kok-Leong Ong:
Enhancing the Effectiveness of Clustering with Spectra Analysis. IEEE Trans. Knowl. Data Eng. 19(7): 887-902 (2007) - [c92]Haifeng Liu, Wee Keong Ng, Bin Song, Xiang Li, Wen-Feng Lu:
Enabling Mass Customization through Semantic Web Services. APSCC 2007: 239-245 - [c91]Xuan-Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vincent C. S. Lee:
Discovering Frequent Sets from Data Streams with CPU Constraint. AusDM 2007: 121-128 - [c90]Shuguo Han, Wee Keong Ng:
Privacy-Preserving Genetic Algorithms for Rule Discovery. DaWaK 2007: 407-417 - [c89]Shuguo Han, Wee Keong Ng:
Privacy-Preserving Self-Organizing Map. DaWaK 2007: 428-437 - [c88]Haifeng Liu, Vivekanand Gopalkrishnan, Wee Keong Ng, Bin Song, Xiang Li:
Estimating product lifecycle cost using a hybrid approach. ICDIM 2007: 393-398 - [c87]Haifeng Liu, Wee Keong Ng, Bin Song, Xiang Li, Wen-Feng Lu:
An Intelligent Information System for Enabling Product Mass Customization. ICEIS (2) 2007: 316-321 - [c86]Li Wan, Wee Keong Ng, Shuguo Han, Vincent C. S. Lee:
Privacy-preservation for gradient descent methods. KDD 2007: 775-783 - 2006
- [c85]