Seguir
Geong Sen Poh
Geong Sen Poh
Cyber Security AI R & D
Dirección de correo verificada de ntu.edu.sg - Página principal
Título
Citado por
Citado por
Año
Attribute based encryption with privacy protection and accountability for CloudIoT
J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang
IEEE Transactions on Cloud Computing 10 (2), 762-773, 2020
1952020
Searchable symmetric encryption: Designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
1652017
PrivHome: Privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing 18 (3), 1095-1107, 2019
932019
Secure fine-grained encrypted keyword search for e-healthcare cloud
H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1307-1319, 2019
772019
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
672015
PrivDPI: Privacy-preserving encrypted traffic inspection with reusable obfuscated rules
J Ning, GS Poh, JC Loh, J Chia, EC Chang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
622019
Application of reinforcement learning for security enhancement in cognitive radio networks
MH Ling, KLA Yau, J Qadir, GS Poh, Q Ni
Applied Soft Computing 37, 809-829, 2015
532015
LEAP: leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
J Ning, X Huang, GS Poh, J Yuan, Y Li, J Weng, RH Deng
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
412021
Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment
J Ning, X Huang, GS Poh, S Xu, JC Loh, J Weng, RH Deng
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
322020
Application of reinforcement learning in cognitive radio networks: Models and algorithms
KLA Yau, GS Poh, SF Chien, HAA Al-Rawi
The Scientific World Journal 2014 (1), 209810, 2014
242014
: Privacy-Preserving Integration and Sharing of Datasets
HW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
232019
Trust and reputation management in cognitive radio networks: a survey
MH Ling, KLA Yau, GS Poh
Security and Communication Networks 7 (11), 2160-2179, 2014
222014
Weighted entropy-based measure for image segmentation
WK Lai, IM Khan, GS Poh
Procedia Engineering 41, 1261-1267, 2012
212012
A survey of privacy-preserving techniques for encrypted traffic inspection over network middleboxes
GS Poh, DM Divakaran, HW Lim, J Ning, A Desai
arXiv preprint arXiv:2101.04338, 2021
182021
An efficient buyer-seller watermarking protocol based on chameleon encryption
GS Poh, KM Martin
International Workshop on Digital Watermarking, 433-447, 2008
182008
Update recovery attacks on encrypted database within two updates using range queries leakage
J Ning, GS Poh, X Huang, RH Deng, S Cao, EC Chang
IEEE Transactions on Dependable and Secure Computing 19 (2), 1164-1180, 2020
172020
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
172012
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
162018
PSI-stats: private set intersection protocols supporting secure statistical functions
JHM Ying, S Cao, GS Poh, J Xu, HW Lim
International Conference on Applied Cryptography and Network Security, 585-604, 2022
142022
Attribute-based encryption with efficient keyword search and user revocation
J Wang, X Yin, J Ning, GS Poh
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
112019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20