Volgen
Geong Sen Poh
Geong Sen Poh
Cyber Security AI R & D
Geverifieerd e-mailadres voor ntu.edu.sg - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Attribute based encryption with privacy protection and accountability for CloudIoT
J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang
IEEE Transactions on Cloud Computing 10 (2), 762-773, 2020
1492020
Searchable symmetric encryption: Designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
1482017
PrivHome: Privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing 18 (3), 1095-1107, 2019
772019
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
652015
Secure fine-grained encrypted keyword search for e-healthcare cloud
H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1307-1319, 2019
602019
PrivDPI: Privacy-preserving encrypted traffic inspection with reusable obfuscated rules
J Ning, GS Poh, JC Loh, J Chia, EC Chang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
542019
Application of reinforcement learning for security enhancement in cognitive radio networks
MH Ling, KLA Yau, J Qadir, GS Poh, Q Ni
Applied Soft Computing 37, 809-829, 2015
522015
Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment
J Ning, X Huang, GS Poh, S Xu, JC Loh, J Weng, RH Deng
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
232020
LEAP: leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
J Ning, X Huang, GS Poh, J Yuan, Y Li, J Weng, RH Deng
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
212021
Application of reinforcement learning in cognitive radio networks: Models and algorithms
KLA Yau, GS Poh, SF Chien, HAA Al-Rawi
The Scientific World Journal 2014, 2014
212014
Weighted entropy-based measure for image segmentation
WK Lai, IM Khan, GS Poh
Procedia Engineering 41, 1261-1267, 2012
212012
: Privacy-Preserving Integration and Sharing of Datasets
HW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
202019
Trust and reputation management in cognitive radio networks: a survey
MH Ling, KLA Yau, GS Poh
Security and Communication Networks 7 (11), 2160-2179, 2014
202014
Update recovery attacks on encrypted database within two updates using range queries leakage
J Ning, GS Poh, X Huang, RH Deng, S Cao, EC Chang
IEEE Transactions on Dependable and Secure Computing 19 (2), 1164-1180, 2020
172020
A survey of privacy-preserving techniques for encrypted traffic inspection over network middleboxes
GS Poh, DM Divakaran, HW Lim, J Ning, A Desai
arXiv preprint arXiv:2101.04338, 2021
162021
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
162018
An efficient buyer-seller watermarking protocol based on chameleon encryption
GS Poh, KM Martin
International Workshop on Digital Watermarking, 433-447, 2008
162008
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
152012
Design and analysis of fair content tracing protocols
GS Poh
Ph. D. Thesis, 2009
112009
SearchaStore: Fast and secure searchable cloud services
WK Lee, RCW Phan, GS Poh, BM Goi
Cluster Computing 21, 1189-1202, 2018
92018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20