Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware HS Yeo, BG Lee, H Lim Multimedia Tools and Applications 74, 2687-2715, 2015 | 251 | 2015 |
A strong user authentication framework for cloud computing AJ Choudhury, P Kumar, M Sain, H Lim, H Jae-Lee 2011 IEEE Asia-Pacific Services Computing Conference, 110-115, 2011 | 227 | 2011 |
Online banking authentication system using mobile-OTP with QR-code YS Lee, NH Kim, H Lim, HK Jo, HJ Lee 5th International Conference on Computer Sciences and Convergence …, 2010 | 118 | 2010 |
Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management JN Witanto, H Lim, M Atiquzzaman Future generation computer systems 87, 35-42, 2018 | 82 | 2018 |
A new content-defined chunking algorithm for data deduplication in cloud storage RNS Widodo, H Lim, M Atiquzzaman Future Generation Computer Systems 71, 145-156, 2017 | 66 | 2017 |
Two factor authentication for cloud computing S Lee, I Ong, HT Lim, HJ Lee Journal of information and communication convergence engineering 8 (4), 427-432, 2010 | 62 | 2010 |
Synchronizing UAV teams for timely data collection and energy transfer by deep reinforcement learning OS Oubbati, M Atiquzzaman, H Lim, A Rachedi, A Lakas IEEE Transactions on Vehicular Technology 71 (6), 6682-6697, 2022 | 58 | 2022 |
Smart government framework with geo-crowdsourcing and social media analysis JN Witanto, H Lim, M Atiquzzaman Future Generation Computer Systems 89, 1-9, 2018 | 57 | 2018 |
Homomorphic encryption in mobile multi cloud computing M Louk, H Lim 2015 International Conference on Information Networking (ICOIN), 493-497, 2015 | 48 | 2015 |
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices HS Yeo, XS Phang, HJ Lee, H Lim Journal of Network and Computer Applications 43, 142-156, 2014 | 32 | 2014 |
e2Home: A lightweight smart home management system CM Yeoh, HY Tan, CK Kok, HJ Lee, H Lim 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 28 | 2008 |
One-time knocking framework using SPA and IPsec JH Liew, S Lee, I Ong, HJ Lee, H Lim 2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010 | 27 | 2010 |
A ping pong based one-time-passwords authentication system B Davaanaym, YS Lee, HJ Lee, SG Lee, HT Lim 2009 Fifth International Joint Conference on INC, IMS and IDC, 574-579, 2009 | 23 | 2009 |
SDM: Smart deduplication for mobile cloud storage RNS Widodo, H Lim, M Atiquzzaman Future Generation Computer Systems 70, 64-73, 2017 | 22 | 2017 |
An efficient online signature verification scheme using dynamic programming of string matching AG Reza, H Lim, MJ Alam Convergence and Hybrid Information Technology: 5th International Conference …, 2011 | 21 | 2011 |
Performance of packet analysis between observer and wireshark HH Kim, HJ Lee, HT Lim 2020 22nd International Conference on Advanced Communication Technology …, 2020 | 20 | 2020 |
A comparative study of tree-based and mesh-based overlay p2p media streaming CY Goh, HS Yeo, H Lim, PK Hoong, JWY Lim, IKT Tan International Journal of Multimedia and Ubiquitous Engineering 8 (4), 97-105, 2013 | 19 | 2013 |
Security system for healthcare data in cloud computing M Louk, H Lim, HJ Lee International Journal of Security and Its Applications 8 (3), 241-248, 2014 | 17 | 2014 |
An analysis of security system for intrusion in smartphone environment M Louk, H Lim, HJ Lee The Scientific World Journal 2014 (1), 983901, 2014 | 17 | 2014 |
Dragon-MAC: Securing wireless sensor networks with authenticated encryption SY Lim, CC Pu, HT Lim, HJ Lee Cryptology ePrint Archive, 2007 | 17 | 2007 |