Dr Sye Loong Keoh

  • Associate Professor (Singapore: Computing Science)
  • Associate Professor (School of Computing Science)

telephone: +65 6908 6042
email: SyeLoong.Keoh@glasgow.ac.uk
pronouns: He/him/his

School of Computing Science, University of Glasgow, SIT Building @NYP Campus, Nanyang Polytechnic, 172, Ang Mo Kio Ave 8, Singapore 567739

Import to contacts

ORCID iDhttps://orcid.org/0000-0003-3640-5010

Biography

Sye-Loong Keoh is an Associate Professor in the School of Computing Science, University of Glasgow (UofG, Singapore campus). He is currently the Director of Research Programmes in UofG Singapore. He holds a Ph.D. in Computing from Imperial College London. Prior to joining Glasgow, he was a Senior Scientist at Philips Research Eindhoven, The Netherlands (Philips Lighting is now known as Signify). His areas of expertise include cyber security for Internet of Things (IoT), lightweight security systems for cyber-physical systems, and policy-based security management for pervasive and distributed systems.

He leads the cyber-security research activities in UofG Singapore where he has designed several lightweight authentication protocols and key management schemes for IoT, building management and industrial control systems. More recently, he is researching on new techniques for securing end-to-end communication and ensuring data provenance in IoT environment. While working at Philips Research, he was responsible for standardizing Marlin Digital Rights Management (DRM) technology for content protection, and lightweight security protocols for Philips’s IoT-based lighting systems.

Personal site: http://www.dcs.gla.ac.uk/~sye

Research interests

  • Security Protocol Design
  • Authentication and Access Control Model
  • Wireless Sensor Networks
  • Pervasive Computing and 5G Communication Security
  • Internet of Things
  • Urban Mobility
  • Trusted AI

I am serving as workshop co-chair of the IEEE World Forum on Internet of Things (WF-IoT) 2023, to be held in Aveiro, Portugal.
Please submit your workshop proposal by 26th April 2023, technical paper submission is due in June 2023

I am also serving as guest editors for the following journal special issues:

Publications

List by: Type | Date

Jump to: 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2005 | 2004 | 2002
Number of items: 79.

2024

Lim, Y. T., Keoh, S. L. , Chong, Y.-W., Ibrahim, N. F. and Sharul Kamal, A. R. (2024) An ANN-based Prediction Model for Public Bus Journey Time. In: 6th International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2024), Osaka, Japan, 19-22 Feb 2024, (Accepted for Publication)

2023

Kang, D. M., Faahym, H., Meftah, S., Keoh, S. L. and Khin, M. M. A. (2023) Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. In: Staggs, J. and Shenoi, S. (eds.) Critical Infrastructure Protection XVII. ICCIP 2023. IFIP Advances in Information and Communication Technology. Springer: Cham, pp. 177-192. ISBN 9783031495847 (doi: 10.1007/978-3-031-49585-4_9)

Hoo, F., Tan, F. S. L., Chan, R. C. B., Waszecki, P., Keoh, S. L. , Seow, C. K. , Li, D., Cao, Q. and Sum, C. S. (2023) 5G-Wi-SUN for Building Management System. In: 6th International Conference on Applied Computational Intelligence in Information Systems, Bandar Seri Begawan, Brunei, 23-25 Oct 2023, ISBN 9798350317428 (doi: 10.1109/ACIIS59385.2023.10367377)

Kam, S.-H., Chong, Y.-W., Ibrahim, N. F., Keoh, S. L. , Phon-Amnuaisuk, S. and Sharul Kamal, A. R. (2023) Predicting Estimated Time of Arrival Using Boosting Models. In: 6th International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2024), Osaka, Japan, 19-22 Feb 2024, (Accepted for Publication)

Elijah, O., Keoh, S. L. , bin Abdul Rahim, S. K., Seow, C. K. , Cao, Q. , bin Sarijari, M. A., Ibrahim, N. F. and Basuki, A. (2023) Transforming urban mobility with internet of things: public bus fleet tracking using proximity-based bluetooth beacons. Frontiers in the Internet of Things, 2, 1255995. (doi: 10.3389/friot.2023.1255995)

Sim, Y. H. R. S., Lua, Z. Z., Kelaver, K. K., Chua, J. Q., Lim, I. Z. J., Cao, Q. , Keoh, S. L. and Lim, L. H. I. (2023) Experiences and Lessons Learned from Real-World Projects in Software Engineering Subject. In: 35th IEEE International Conference on Software Engineering Education and Training (CSEE&T), Tokyo, Japan, 7-9 Aug 2023, ISBN 9798350322026 (doi: 10.1109/CSEET58097.2023.00036)

Ayaz, F. , Zakariyya, I., Cano Reyes, J. , Keoh, S. L. , Singer, J. , Pau, D. and Kharbouche-Harrari, M. (2023) Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks. In: International Joint Conference on Neural Networks (IJCNN 2023), Gold Coast, Australia, 18-23 June 2023, ISBN 9781665488679 (doi: 10.1109/IJCNN54540.2023.10191429)

Xin, X., Keoh, S. L. , Sevegnani, M. and Saerbeck, M. (2023) Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study. In: IEEE 8th World Forum on Internet of Things (WF-IoT2022), Yokohama, Japan, 31 Oct - 04 Nov, ISBN 9781665491532 (doi: 10.1109/WF-IoT54382.2022.10152177)

Xu, X., Keoh, S. L. , Seow, C. K. , Cao, Q. and Rahim, S. K. b. A. (2023) Towards Prediction of Bus Arrival Time using Multi-layer Perceptron (MLP) and MLP Regressor. In: 8th International Conference on Business and Industrial Research (ICBIR 2023), Bangkok, Thailand, 18-19 May 2023, pp. 669-674. ISBN 9798350399646 (doi: 10.1109/ICBIR57571.2023.10147614)

Thong, M. J. Q., Yau, A. Q. X., Goh, S. A., Gu, J., Cao, Q. and Keoh, S. L. (2023) Learning Experiences and Analysis in Professional Software Development Subject. In: 2022 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE), Hong Kong, 04-07 Dec 2022, pp. 703-706. ISBN 9781665491174 (doi: 10.1109/TALE54877.2022.00123)

Cao, Q. , Seow, C. K. , Lim, L. H. I. , Keoh, S. L. , Dale, V. , Honeychurch, S. , Tasler, N. and Bremner, D. (2023) Learners’ differences in blended learner-centric approach for a common programming subject. International Journal of Information and Education Technology, 13(6), pp. 906-913. (doi: 10.18178/ijiet.2023.13.6.1886)

Rasheed, F., Saleem, Y., Yau, K.-L. A., Chong, Y.-W. and Keoh, S. L. (2023) The role of deep learning in parking space identification and prediction systems. Computers, Materials and Continua, 75(1), pp. 761-784.

2022

Xin, X. , Keoh, S. L. , Sevegnani, M. , Saerbeck, M. and Khoo, T. P. (2022) Adaptive model verification for modularized industry 4.0 applications. IEEE Access, 10, pp. 125353-125364. (doi: 10.1109/ACCESS.2022.3225399)

Chia, W. M. D., Keoh, S. L. , Goh, C. and Johnson, C. (2022) Risk assessment methodologies for autonomous driving: a survey. IEEE Transactions on Intelligent Transportation Systems, 23(10), pp. 16923-16939. (doi: 10.1109/TITS.2022.3163747)

Chong, Y.-W., Villanueva-Libunao, K., Chee, S.-Y., Alvarez, M. J., Yau, K.-L. A. and Keoh, S. L. (2022) Artificial intelligence policies to enhance urban mobility in Southeast Asia. Frontiers in Sustainable Cities, 4, 824391. (doi: 10.3389/frsc.2022.824391)

Lee, J. S. A., Bin Abbas, M. F., Seow, C. K. , Cao, Q. , Yar, K. P., Keoh, S. L. and McLoughlin, I. (2022) Non-verbal auditory aspects of human-service robot interaction. In: The 15th IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI 2021), Singapore, 11 - 12 December 2021, ISBN 9781665467223 (doi: 10.1109/SOLI54607.2021.9672366)

Chu, Y. H., Keoh, S. L. , Seow, C. K. , Cao, Q. , Wen, K. and Tan, S. Y. (2022) GPS Signal Authentication Using a Chameleon Hash Keychain. In: Critical Infrastructure Protection XV, 15-16 Mar 2021, pp. 209-226. ISBN 9783030935108 (doi: 10.1007/978-3-030-93511-5_10)

Chia, W. M. D., Keoh, S. L. , Michala, A. L. and Goh, C. (2022) Infrastructure-based pedestrian risk tagging methodology to support AV risk assessment. IEEE Access, 10, pp. 71462-71480. (doi: 10.1109/ACCESS.2022.3188306)

2021

Ohba, Y., Koh, J., Ng, N. and Keoh, S. L. (2021) Performance Evaluation of a Blockchain-based Content Distribution over Wireless Mesh Networks. In: IEEE 7th World Forum on Internet of Things (WF-IoT), New Orleans, Louisiana, USA, 14-31 July 2021, ISBN 9781665444323 (doi: 10.1109/WF-IoT51360.2021.9595503)

Chia, W. M. D., Keoh, S. L. , Michala, A. L. and Goh, C. (2021) Real-time Recursive Risk Assessment Framework for Autonomous Vehicle Operations. In: 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 25-28 Apr 2021, ISBN 9781728189642

2020

Ahmad, I., Yau, K.-L. A. and Keoh, S. L. (2020) A Hybrid Reinforcement Learning-Based Trust Model for 5G Networks. In: 2020 IEEE Conference on Applications, Information and Network Security (AINS), 17-19 Nov 2020, pp. 20-25. ISBN 9781728192406 (doi: 10.1109/AINS50155.2020.9315132)

Zhou, X. and Keoh, S. L. (2020) Deployment of Facial Recognition Models at the Edge: a Feasibility Study. In: 2020 21st Asia Pacific Network Operations and Management Symposium (APNOMS), Daegu, South Korea, 23-25 Sep 2020, ISBN 9788995004388 (doi: 10.23919/APNOMS50412.2020.9236972)

Tang, Z. and Keoh, S. L. (2020) An Efficient Scheme to Secure Data Provenance in Home Area Networks. In: Workshop on 5G Security: Current Trends, Challenges and New Enablers, in conjunction with IEEE 5G World Forum, Bangalore, India, 10-12 Sep 2020, pp. 115-120. ISBN 9781728172996 (doi: 10.1109/5GWF49715.2020.9221402)

Xin, X., Keoh, S. L. , Sevegnani, M. and Saerbeck, M. (2020) Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications. In: IEEE International Conference on Smart Internet of Things (IEEE SmartIoT 2020), Beijing, China, 14-16 Aug 2020, ISBN 9781728165158 (doi: 10.1109/SmartIoT49966.2020.00016)

Keoh, S. L. , Tan, H. C. and Tang, Z. (2020) Authentication and integrity protection for real-time cyber-physical systems. In: Tian, Y.-C. and Levi, D. C. (eds.) Handbook of Real-Time Computing. Springer: Singapore. ISBN 9789814585873 (doi: 10.1007/978-981-4585-87-3_39-1)

Lee, Z. E., Chua, R. L. H., Keoh, S. L. and Ohba, Y. (2020) Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications. In: IEEE GLOBECOM 2019, Waikoloa, HI, USA, 09-13 Dec 2019, ISBN 9781728109626 (doi: 10.1109/GLOBECOM38437.2019.9013329)

Lim, L. H. I. , Goh, C. S. , Davies, J. , Yang, H. , Keoh, S. L. , Howes, D. and Dale, V. (2020) Evaluation of Student and Staff Perceptions on L&T Models Across Multiple Disciplines. Applied Learning Conference 2020, Singapore, 30-31 Jan 2020.

Ahmad, I., Yau, K.-L. A., Mee Hong, L. and Keoh, S. L. (2020) Trust and reputation management for securing collaboration in 5G access networks: the road ahead. IEEE Access, 8, pp. 62542-62560. (doi: 10.1109/ACCESS.2020.2984318)

2019

Lam, T. C. Y., Yew, S. S. L. and Keoh, S. L. (2019) Bluetooth Mesh Networking: an Enabler of Smart Factory Connectivity and Management. In: The 20th Asia-Pacific Network Operations and Management Symposium (APNOMS 2019), Matsue, Japan, 18-21 Sep 2019, ISBN 9784885523205 (doi: 10.23919/APNOMS.2019.8893091)

Gunady, S. and Keoh, S. L. (2019) A Non-GPS Based Location Tracking of Public Buses using Bluetooth Proximity Beacons. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15-18 Apr 2019, ISBN 9781538649800 (doi: 10.1109/WF-IoT.2019.8767198)

2018

Lim, B. S., Keoh, S. L. and Thing, V. L.L. (2018) Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, ISBN 9781467399449 (doi: 10.1109/WF-IoT.2018.8355132)

Ng, J., Keoh, S. L. , Tang, Z. and Ko, H. (2018) SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, pp. 219-224. ISBN 9781467399449 (doi: 10.1109/WF-IoT.2018.8355106)

Tan, H. C., Lim, K., Keoh, S. L. , Tang, Z., Leong, D. and Sum, C. S. (2018) Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, pp. 225-230. ISBN 9781467399449 (doi: 10.1109/WF-IoT.2018.8355112)

Chan, F. M., Xu, Q., Seah, H. J., Tang, Z., Keoh, S. L. and Aung, K. M. M. (2018) Privacy Preserving Computation in Home Loans using the FRESCO Framework. In: Future of Information and Communication Conference (FICC), Singapore, 05-06 Apr 2018, ISBN 9783030034047 (doi: 10.1007/978-3-030-03405-4_7)

2017

Chia, M. H., Keoh, S. L. and Tang, Z. (2017) Secure Data Provenance in Home Energy Monitoring Networks. In: The 3rd Industrial Control System Security Workshop (ICSS), Orlando, FL, USA, 05 Dec 2017, pp. 7-14. ISBN 9781450363334 (doi: 10.1145/3174776.3174778)

Bin Othman, M. S., Keoh, S. L. and Tan, G. (2017) Efficient Journey Planning and Congestion Prediction Through Deep Learning. In: The Third IEEE Annual International Smart Cities Conference (ISC2 2017), Wuxi, China, 14-17 Sep 2017, ISBN 9781538625248 (doi: 10.1109/ISC2.2017.8090805)

Ko, H., Jin, J. and Keoh, S. L. (2017) ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. In: 3rd ACM Cyber-Physical System Security Workshop (CPSS), Abu Dhabi, UAE, 02 Apr 2017, pp. 69-80. ISBN 9781450349567 (doi: 10.1145/3055186.3055194)

Sim, L. J. H., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2017) A Cloud Authentication Protocol using One-Time Pad. In: IEEE Technologies for Smart Nation (TENCON), Marina Bay Sands, Singapore, 22-25 Nov 2016, pp. 2513-2516. ISBN 9781509025978 (doi: 10.1109/TENCON.2016.7848486)

Yin, X. and Keoh, S. L. (2017) Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control. In: IEEE World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12-14 Dec 2016, pp. 666-671. ISBN 9781509041305 (doi: 10.1109/WF-IoT.2016.7845398)

Ko, H., Keoh, S. L. and Jin, J. (2017) Privacy protection for cloud-based robotic networks. In: Houbing, S., Fink, G. A. and Jeschke, S. (eds.) Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. Wiley: Chichester. ISBN 9781119226048 (doi: 10.1002/9781119226079.ch10)

2016

Ko, H., Jin, J. and Keoh, S. L. (2016) Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet of Things Journal, 3(6), pp. 1006-1014. (doi: 10.1109/JIOT.2016.2545926)

Syed, A. R., Yau, K.-L. A., Qadir, J., Mohamad, H., Ramli, N. and Keoh, S. L. (2016) Route selection for multi-hop cognitive radio networks using reinforcement learning: an experimental study. IEEE Access, 4, pp. 6304-6324. (doi: 10.1109/ACCESS.2016.2613122)

Ang, Y. H., Keoh, S. L. and Tang, Z. (2016) Privacy-preserving spatial and temporal aggregation of smart energy data. Journal of Information Assurance and Security, 11(4), pp. 214-222.

Lim, W. L. H., Lum, J. T. W., Yeo, I. J. W. and Keoh, S. L. (2016) A Crowd-Assisted Real-time Public Transport Information Service: No More Endless Wait. In: First International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, Sydney, Australia, 14-18 Mar 2016, pp. 1-6. ISBN 9781509019410 (doi: 10.1109/PERCOMW.2016.7457088)

2015

Keoh, S. L. , Ang, Y. H. and Tang, Z. (2015) A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data. In: IEEE 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 Dec 2015,

Keoh, S. L. , Au, K. W. K. and Tang, Z. (2015) Securing Industrial Control System: An End-to-End Integrity Verification Approach. In: Industrial Control System Security (ICSS) Workshop in conjunction with 31st Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, 8 Dec 2015,

Chuan, W. B., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2015) Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage. In: International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, Asia, 26-27 Oct 2015,

2014

Keoh, S. L. and Tang, Z. (2014) Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In: IEEE 10th International Conference on Information Assurrance and Security (IAS), Okinawa, Japan, 27 - 29 Nov 2014,

Keoh, S. L. , Kumar, S. S. and Tschofenig, H. (2014) Securing the Internet of Things: a standardization perspective. IEEE Internet of Things Journal, 1(3), pp. 265-275. (doi: 10.1109/JIOT.2014.2323395)

2013

Soni, A., Keoh, S.L. , Kumar, S.S. and Garcia-Morchon, O. (2013) HADA: hybrid access decision architecture for building automation and control systems. In: 1st International Symposium for ICS & SCADA Cyber Security, Leicester, UK, 16-17 Sep 2013,

Garcia-Morchon, O., Keoh, S.L. , Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F. and Ziegeldorf, J.H. (2013) Securing the IP-based internet of things with HIP and DTLS. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, 17 Apr 2013, pp. 119-124. (doi: 10.1145/2462096.2462117)

Koninklijke Philips N.V. (2013) Methods, Devices and Systems for Establishing End-To-End Secure Connections and for Securely Communicating Data Packets. .

Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G., Kumar, S.S. and Keoh, S.L. (2013) HIP security architecture for the IP-based internet of things. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 25-28 Mar 2013, pp. 1331-1336. (doi: 10.1109/WAINA.2013.158)

Koninklijke Philips N.V. (2013) System and Method for Access Decision Evaluation for Building Automation and Control Systems. .

2012

Brachmann, M., Keoh, S.L. , Morchon, O.G. and Kumar, S.S. (2012) End-to-end transport security in the IP-based internet of things. In: 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 Jul - 2 Aug 2012, pp. 1-5. (doi: 10.1109/ICCCN.2012.6289292)

Koninklijke Philips Electronics N.V. (2012) Secure Access to Personal Health Records in Emergency Situations. .

Koninklijke Philips N.V. (2012) Resource Metering System and Method Using Such a System for Smart Energy Consumption. .

2011

Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L. , Kumar, S.S. and Wehrle, K. (2011) Security challenges in the IP-based internet of things. Wireless Personal Communications, 61(3), pp. 527-542. (doi: 10.1007/s11277-011-0385-5)

Keoh, S.L. (2011) Marlin: toward seamless content sharing and rights management. IEEE Communications Magazine, 49(11), pp. 174-180. (doi: 10.1109/MCOM.2011.6069726)

Keoh, S.L. (2011) Efficient group key management and authentication for body sensor networks. In: IEEE International Conference on Communications (ICC), Kyoto, Japan, 5 - 9 Jun 2011, pp. 1-6. (doi: 10.1109/icc.2011.5962805)

Keoh, S.L. , Asim, M., Kumar, S.S. and Lenoir, P. (2011) Secure spontaneous emergency access to personal health record. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), San Francisco, CA, USA, 12 Jun 2011,

2010

Keoh, S.L. (2010) A Policy-Based Security Framework for Ad-Hoc Networks: Secure Formation, Evolution and Management. VDM Verlag Dr. Müller. ISBN 9783639272666

2009

Zhu, Y., Keoh, S.L. , Sloman, M. and Lupu, E. (2009) A lightweight policy system for body sensor networks. IEEE Transactions on Network and Service Management, 6(3), pp. 137-148. (doi: 10.1109/TNSM.2009.03.090301)

Keoh, S.L. , Lupu, E. and Sloman, M. (2009) Securing body sensor networks: sensor association and key management. In: IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA, 9-13 Mar 2009, pp. 1-6. (doi: 10.1109/PERCOM.2009.4912756)

Keoh, S.L. and Vrielink, K. (2009) An implementation experience of domain management in marlin. In: Nineth ACM Workshop on Digital Rights Management, Chicago, IL, USA, 9 Nov 2009, pp. 29-38. (doi: 10.1145/1655048.1655054)

Zhu, Y., Sloman, M., Lupu, E. and Keoh, S.L. (2009) Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009., London, UK, 1-3 Apr 2009, (doi: 10.4108/ICST.PERVASIVEHEALTH2009.5939)

2008

Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.L. and Schaeffer-Filho, A. (2008) AMUSE: autonomic management of ubiquitous e-health systems. Concurrency and Computation: Practice and Experience, 20(3), pp. 277-295. (doi: 10.1002/cpe.1194)

Schaeffer-Filho, A., Lupu, E., Sloman, M., Keoh, S.L. , Lobo, J. and Calo, S. (2008) A role-based infrastructure for the management of dynamic communities. In: Second International Conference on Autonomous Infrastructure, Management and Security (AIMS), Bremen, Germany, 1-3 Jul 2008, pp. 1-14. (doi: 10.1007/978-3-540-70587-1_1)

Yanmin, Z., Keoh, S.L. , Sloman, M., Lupu, E., Yu, Z., Dulay, N. and Pryce, N. (2008) Finger: an efficient policy system for body sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Atlanta, GA, USA, 29 Sep - 2 Oct 2008, pp. 428-433. (doi: 10.1109/MAHSS.2008.4660033)

Zhu, Y., Keoh, S.L. , Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) An efficient policy system for body sensor networks. In: 14th IEEE International Conference on Parallel and Distributed Systems, 2008. ICPADS '08., Melbourne, Australia, 8-10 Dec 2008, pp. 383-390. (doi: 10.1109/ICPADS.2008.52)

Zhu, Y., Keoh, S.L. , Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) A policy system to support adaptability and security on body sensors. In: 5th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), Hong Kong, China, 1-3 Jun 2008, pp. 37-40. (doi: 10.1109/ISSMDBS.2008.4575010)

2007

Keoh, S.L. , Dulay, N., Lupu, E., Twidle, K., Schaeffer-Filho, A.E., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Self-managed cell: a middleware for managing body-sensor networks. In: MobiQuitous 2007: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, PA, USA, 6-10 Aug 2007, pp. 1-5. (doi: 10.1109/MOBIQ.2007.4451009)

Keoh, S.L. et al. (2007) Policy-based management of body-sensor networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), Aachen, Germany, 26-28 March 2007, pp. 92-98.

Schaeffer-Filho, A., Lupu, E., Dulay, N., Keoh, S.L. , Twidle, K., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Towards supporting interactions between self-managed cells. In: SASO'07: First International Conference on Self-Adaptive and Self-Organizing Systems, Cambridge, MA, USA, 9-11 Jul 2007, pp. 224-236. (doi: 10.1109/SASO.2007.64)

Strowes, S.D., Dulay, N., Heeps, S., Keoh, S.L. , Lupu, E., Schaeffer-Filho, A.E., Sloman, M. and Sventek, J.S. (2007) Wide-area SMC interaction, implementation and emulation. Technical Report. Dept of Computing Science, University of Glasgow, Glasgow, UK.

2005

Keoh, S.L. and Lupu, E. (2005) An efficient access control model for mobile ad-hoc communities. In: Second International Conference on Security in Pervasive Computing, Boppard, Germany, 5-8 April 2005, pp. 210-224. (doi: 10.1007/978-3-540-32004-3_21)

2004

Keoh, S.L. , Lupu, E. and Sloman, M. (2004) PEACE: a policy-based establishment of ad-hoc communities. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, 6-10 Dec, 2004, pp. 386-395. (doi: 10.1109/CSAC.2004.26)

Keoh, S.L. and Lupu, E. (2004) Peer trust in mobile ad-hoc communities. In: 11th HP-OVUA Annual Planetary Workshop, Paris, France, 20-23 Jun 2004,

2002

Keoh, S.L. and Lupu, E. (2002) Towards flexible credential verification in mobile ad-hoc networks. In: 2nd ACM International Workshop on Principles of Mobile Computing (POMC), Toulouse, France, 30-31 Oct, 2002, pp. 58-65. (doi: 10.1145/584490.584503)

This list was generated on Fri Apr 19 06:49:47 2024 BST.
Number of items: 79.

Articles

Elijah, O., Keoh, S. L. , bin Abdul Rahim, S. K., Seow, C. K. , Cao, Q. , bin Sarijari, M. A., Ibrahim, N. F. and Basuki, A. (2023) Transforming urban mobility with internet of things: public bus fleet tracking using proximity-based bluetooth beacons. Frontiers in the Internet of Things, 2, 1255995. (doi: 10.3389/friot.2023.1255995)

Cao, Q. , Seow, C. K. , Lim, L. H. I. , Keoh, S. L. , Dale, V. , Honeychurch, S. , Tasler, N. and Bremner, D. (2023) Learners’ differences in blended learner-centric approach for a common programming subject. International Journal of Information and Education Technology, 13(6), pp. 906-913. (doi: 10.18178/ijiet.2023.13.6.1886)

Rasheed, F., Saleem, Y., Yau, K.-L. A., Chong, Y.-W. and Keoh, S. L. (2023) The role of deep learning in parking space identification and prediction systems. Computers, Materials and Continua, 75(1), pp. 761-784.

Xin, X. , Keoh, S. L. , Sevegnani, M. , Saerbeck, M. and Khoo, T. P. (2022) Adaptive model verification for modularized industry 4.0 applications. IEEE Access, 10, pp. 125353-125364. (doi: 10.1109/ACCESS.2022.3225399)

Chia, W. M. D., Keoh, S. L. , Goh, C. and Johnson, C. (2022) Risk assessment methodologies for autonomous driving: a survey. IEEE Transactions on Intelligent Transportation Systems, 23(10), pp. 16923-16939. (doi: 10.1109/TITS.2022.3163747)

Chong, Y.-W., Villanueva-Libunao, K., Chee, S.-Y., Alvarez, M. J., Yau, K.-L. A. and Keoh, S. L. (2022) Artificial intelligence policies to enhance urban mobility in Southeast Asia. Frontiers in Sustainable Cities, 4, 824391. (doi: 10.3389/frsc.2022.824391)

Chia, W. M. D., Keoh, S. L. , Michala, A. L. and Goh, C. (2022) Infrastructure-based pedestrian risk tagging methodology to support AV risk assessment. IEEE Access, 10, pp. 71462-71480. (doi: 10.1109/ACCESS.2022.3188306)

Ahmad, I., Yau, K.-L. A., Mee Hong, L. and Keoh, S. L. (2020) Trust and reputation management for securing collaboration in 5G access networks: the road ahead. IEEE Access, 8, pp. 62542-62560. (doi: 10.1109/ACCESS.2020.2984318)

Ko, H., Jin, J. and Keoh, S. L. (2016) Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet of Things Journal, 3(6), pp. 1006-1014. (doi: 10.1109/JIOT.2016.2545926)

Syed, A. R., Yau, K.-L. A., Qadir, J., Mohamad, H., Ramli, N. and Keoh, S. L. (2016) Route selection for multi-hop cognitive radio networks using reinforcement learning: an experimental study. IEEE Access, 4, pp. 6304-6324. (doi: 10.1109/ACCESS.2016.2613122)

Ang, Y. H., Keoh, S. L. and Tang, Z. (2016) Privacy-preserving spatial and temporal aggregation of smart energy data. Journal of Information Assurance and Security, 11(4), pp. 214-222.

Keoh, S. L. , Kumar, S. S. and Tschofenig, H. (2014) Securing the Internet of Things: a standardization perspective. IEEE Internet of Things Journal, 1(3), pp. 265-275. (doi: 10.1109/JIOT.2014.2323395)

Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L. , Kumar, S.S. and Wehrle, K. (2011) Security challenges in the IP-based internet of things. Wireless Personal Communications, 61(3), pp. 527-542. (doi: 10.1007/s11277-011-0385-5)

Keoh, S.L. (2011) Marlin: toward seamless content sharing and rights management. IEEE Communications Magazine, 49(11), pp. 174-180. (doi: 10.1109/MCOM.2011.6069726)

Zhu, Y., Keoh, S.L. , Sloman, M. and Lupu, E. (2009) A lightweight policy system for body sensor networks. IEEE Transactions on Network and Service Management, 6(3), pp. 137-148. (doi: 10.1109/TNSM.2009.03.090301)

Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.L. and Schaeffer-Filho, A. (2008) AMUSE: autonomic management of ubiquitous e-health systems. Concurrency and Computation: Practice and Experience, 20(3), pp. 277-295. (doi: 10.1002/cpe.1194)

Books

Keoh, S.L. (2010) A Policy-Based Security Framework for Ad-Hoc Networks: Secure Formation, Evolution and Management. VDM Verlag Dr. Müller. ISBN 9783639272666

Book Sections

Kang, D. M., Faahym, H., Meftah, S., Keoh, S. L. and Khin, M. M. A. (2023) Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. In: Staggs, J. and Shenoi, S. (eds.) Critical Infrastructure Protection XVII. ICCIP 2023. IFIP Advances in Information and Communication Technology. Springer: Cham, pp. 177-192. ISBN 9783031495847 (doi: 10.1007/978-3-031-49585-4_9)

Keoh, S. L. , Tan, H. C. and Tang, Z. (2020) Authentication and integrity protection for real-time cyber-physical systems. In: Tian, Y.-C. and Levi, D. C. (eds.) Handbook of Real-Time Computing. Springer: Singapore. ISBN 9789814585873 (doi: 10.1007/978-981-4585-87-3_39-1)

Ko, H., Keoh, S. L. and Jin, J. (2017) Privacy protection for cloud-based robotic networks. In: Houbing, S., Fink, G. A. and Jeschke, S. (eds.) Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. Wiley: Chichester. ISBN 9781119226048 (doi: 10.1002/9781119226079.ch10)

Research Reports or Papers

Strowes, S.D., Dulay, N., Heeps, S., Keoh, S.L. , Lupu, E., Schaeffer-Filho, A.E., Sloman, M. and Sventek, J.S. (2007) Wide-area SMC interaction, implementation and emulation. Technical Report. Dept of Computing Science, University of Glasgow, Glasgow, UK.

Conference or Workshop Item

Lim, L. H. I. , Goh, C. S. , Davies, J. , Yang, H. , Keoh, S. L. , Howes, D. and Dale, V. (2020) Evaluation of Student and Staff Perceptions on L&T Models Across Multiple Disciplines. Applied Learning Conference 2020, Singapore, 30-31 Jan 2020.

Conference Proceedings

Lim, Y. T., Keoh, S. L. , Chong, Y.-W., Ibrahim, N. F. and Sharul Kamal, A. R. (2024) An ANN-based Prediction Model for Public Bus Journey Time. In: 6th International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2024), Osaka, Japan, 19-22 Feb 2024, (Accepted for Publication)

Hoo, F., Tan, F. S. L., Chan, R. C. B., Waszecki, P., Keoh, S. L. , Seow, C. K. , Li, D., Cao, Q. and Sum, C. S. (2023) 5G-Wi-SUN for Building Management System. In: 6th International Conference on Applied Computational Intelligence in Information Systems, Bandar Seri Begawan, Brunei, 23-25 Oct 2023, ISBN 9798350317428 (doi: 10.1109/ACIIS59385.2023.10367377)

Kam, S.-H., Chong, Y.-W., Ibrahim, N. F., Keoh, S. L. , Phon-Amnuaisuk, S. and Sharul Kamal, A. R. (2023) Predicting Estimated Time of Arrival Using Boosting Models. In: 6th International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2024), Osaka, Japan, 19-22 Feb 2024, (Accepted for Publication)

Sim, Y. H. R. S., Lua, Z. Z., Kelaver, K. K., Chua, J. Q., Lim, I. Z. J., Cao, Q. , Keoh, S. L. and Lim, L. H. I. (2023) Experiences and Lessons Learned from Real-World Projects in Software Engineering Subject. In: 35th IEEE International Conference on Software Engineering Education and Training (CSEE&T), Tokyo, Japan, 7-9 Aug 2023, ISBN 9798350322026 (doi: 10.1109/CSEET58097.2023.00036)

Ayaz, F. , Zakariyya, I., Cano Reyes, J. , Keoh, S. L. , Singer, J. , Pau, D. and Kharbouche-Harrari, M. (2023) Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks. In: International Joint Conference on Neural Networks (IJCNN 2023), Gold Coast, Australia, 18-23 June 2023, ISBN 9781665488679 (doi: 10.1109/IJCNN54540.2023.10191429)

Xin, X., Keoh, S. L. , Sevegnani, M. and Saerbeck, M. (2023) Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study. In: IEEE 8th World Forum on Internet of Things (WF-IoT2022), Yokohama, Japan, 31 Oct - 04 Nov, ISBN 9781665491532 (doi: 10.1109/WF-IoT54382.2022.10152177)

Xu, X., Keoh, S. L. , Seow, C. K. , Cao, Q. and Rahim, S. K. b. A. (2023) Towards Prediction of Bus Arrival Time using Multi-layer Perceptron (MLP) and MLP Regressor. In: 8th International Conference on Business and Industrial Research (ICBIR 2023), Bangkok, Thailand, 18-19 May 2023, pp. 669-674. ISBN 9798350399646 (doi: 10.1109/ICBIR57571.2023.10147614)

Thong, M. J. Q., Yau, A. Q. X., Goh, S. A., Gu, J., Cao, Q. and Keoh, S. L. (2023) Learning Experiences and Analysis in Professional Software Development Subject. In: 2022 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE), Hong Kong, 04-07 Dec 2022, pp. 703-706. ISBN 9781665491174 (doi: 10.1109/TALE54877.2022.00123)

Lee, J. S. A., Bin Abbas, M. F., Seow, C. K. , Cao, Q. , Yar, K. P., Keoh, S. L. and McLoughlin, I. (2022) Non-verbal auditory aspects of human-service robot interaction. In: The 15th IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI 2021), Singapore, 11 - 12 December 2021, ISBN 9781665467223 (doi: 10.1109/SOLI54607.2021.9672366)

Chu, Y. H., Keoh, S. L. , Seow, C. K. , Cao, Q. , Wen, K. and Tan, S. Y. (2022) GPS Signal Authentication Using a Chameleon Hash Keychain. In: Critical Infrastructure Protection XV, 15-16 Mar 2021, pp. 209-226. ISBN 9783030935108 (doi: 10.1007/978-3-030-93511-5_10)

Ohba, Y., Koh, J., Ng, N. and Keoh, S. L. (2021) Performance Evaluation of a Blockchain-based Content Distribution over Wireless Mesh Networks. In: IEEE 7th World Forum on Internet of Things (WF-IoT), New Orleans, Louisiana, USA, 14-31 July 2021, ISBN 9781665444323 (doi: 10.1109/WF-IoT51360.2021.9595503)

Chia, W. M. D., Keoh, S. L. , Michala, A. L. and Goh, C. (2021) Real-time Recursive Risk Assessment Framework for Autonomous Vehicle Operations. In: 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 25-28 Apr 2021, ISBN 9781728189642

Ahmad, I., Yau, K.-L. A. and Keoh, S. L. (2020) A Hybrid Reinforcement Learning-Based Trust Model for 5G Networks. In: 2020 IEEE Conference on Applications, Information and Network Security (AINS), 17-19 Nov 2020, pp. 20-25. ISBN 9781728192406 (doi: 10.1109/AINS50155.2020.9315132)

Zhou, X. and Keoh, S. L. (2020) Deployment of Facial Recognition Models at the Edge: a Feasibility Study. In: 2020 21st Asia Pacific Network Operations and Management Symposium (APNOMS), Daegu, South Korea, 23-25 Sep 2020, ISBN 9788995004388 (doi: 10.23919/APNOMS50412.2020.9236972)

Tang, Z. and Keoh, S. L. (2020) An Efficient Scheme to Secure Data Provenance in Home Area Networks. In: Workshop on 5G Security: Current Trends, Challenges and New Enablers, in conjunction with IEEE 5G World Forum, Bangalore, India, 10-12 Sep 2020, pp. 115-120. ISBN 9781728172996 (doi: 10.1109/5GWF49715.2020.9221402)

Xin, X., Keoh, S. L. , Sevegnani, M. and Saerbeck, M. (2020) Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications. In: IEEE International Conference on Smart Internet of Things (IEEE SmartIoT 2020), Beijing, China, 14-16 Aug 2020, ISBN 9781728165158 (doi: 10.1109/SmartIoT49966.2020.00016)

Lee, Z. E., Chua, R. L. H., Keoh, S. L. and Ohba, Y. (2020) Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications. In: IEEE GLOBECOM 2019, Waikoloa, HI, USA, 09-13 Dec 2019, ISBN 9781728109626 (doi: 10.1109/GLOBECOM38437.2019.9013329)

Lam, T. C. Y., Yew, S. S. L. and Keoh, S. L. (2019) Bluetooth Mesh Networking: an Enabler of Smart Factory Connectivity and Management. In: The 20th Asia-Pacific Network Operations and Management Symposium (APNOMS 2019), Matsue, Japan, 18-21 Sep 2019, ISBN 9784885523205 (doi: 10.23919/APNOMS.2019.8893091)

Gunady, S. and Keoh, S. L. (2019) A Non-GPS Based Location Tracking of Public Buses using Bluetooth Proximity Beacons. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15-18 Apr 2019, ISBN 9781538649800 (doi: 10.1109/WF-IoT.2019.8767198)

Lim, B. S., Keoh, S. L. and Thing, V. L.L. (2018) Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, ISBN 9781467399449 (doi: 10.1109/WF-IoT.2018.8355132)

Ng, J., Keoh, S. L. , Tang, Z. and Ko, H. (2018) SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, pp. 219-224. ISBN 9781467399449 (doi: 10.1109/WF-IoT.2018.8355106)

Tan, H. C., Lim, K., Keoh, S. L. , Tang, Z., Leong, D. and Sum, C. S. (2018) Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, pp. 225-230. ISBN 9781467399449 (doi: 10.1109/WF-IoT.2018.8355112)

Chan, F. M., Xu, Q., Seah, H. J., Tang, Z., Keoh, S. L. and Aung, K. M. M. (2018) Privacy Preserving Computation in Home Loans using the FRESCO Framework. In: Future of Information and Communication Conference (FICC), Singapore, 05-06 Apr 2018, ISBN 9783030034047 (doi: 10.1007/978-3-030-03405-4_7)

Chia, M. H., Keoh, S. L. and Tang, Z. (2017) Secure Data Provenance in Home Energy Monitoring Networks. In: The 3rd Industrial Control System Security Workshop (ICSS), Orlando, FL, USA, 05 Dec 2017, pp. 7-14. ISBN 9781450363334 (doi: 10.1145/3174776.3174778)

Bin Othman, M. S., Keoh, S. L. and Tan, G. (2017) Efficient Journey Planning and Congestion Prediction Through Deep Learning. In: The Third IEEE Annual International Smart Cities Conference (ISC2 2017), Wuxi, China, 14-17 Sep 2017, ISBN 9781538625248 (doi: 10.1109/ISC2.2017.8090805)

Ko, H., Jin, J. and Keoh, S. L. (2017) ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. In: 3rd ACM Cyber-Physical System Security Workshop (CPSS), Abu Dhabi, UAE, 02 Apr 2017, pp. 69-80. ISBN 9781450349567 (doi: 10.1145/3055186.3055194)

Sim, L. J. H., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2017) A Cloud Authentication Protocol using One-Time Pad. In: IEEE Technologies for Smart Nation (TENCON), Marina Bay Sands, Singapore, 22-25 Nov 2016, pp. 2513-2516. ISBN 9781509025978 (doi: 10.1109/TENCON.2016.7848486)

Yin, X. and Keoh, S. L. (2017) Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control. In: IEEE World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12-14 Dec 2016, pp. 666-671. ISBN 9781509041305 (doi: 10.1109/WF-IoT.2016.7845398)

Lim, W. L. H., Lum, J. T. W., Yeo, I. J. W. and Keoh, S. L. (2016) A Crowd-Assisted Real-time Public Transport Information Service: No More Endless Wait. In: First International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, Sydney, Australia, 14-18 Mar 2016, pp. 1-6. ISBN 9781509019410 (doi: 10.1109/PERCOMW.2016.7457088)

Keoh, S. L. , Ang, Y. H. and Tang, Z. (2015) A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data. In: IEEE 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 Dec 2015,

Keoh, S. L. , Au, K. W. K. and Tang, Z. (2015) Securing Industrial Control System: An End-to-End Integrity Verification Approach. In: Industrial Control System Security (ICSS) Workshop in conjunction with 31st Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, 8 Dec 2015,

Chuan, W. B., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2015) Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage. In: International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, Asia, 26-27 Oct 2015,

Keoh, S. L. and Tang, Z. (2014) Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In: IEEE 10th International Conference on Information Assurrance and Security (IAS), Okinawa, Japan, 27 - 29 Nov 2014,

Soni, A., Keoh, S.L. , Kumar, S.S. and Garcia-Morchon, O. (2013) HADA: hybrid access decision architecture for building automation and control systems. In: 1st International Symposium for ICS & SCADA Cyber Security, Leicester, UK, 16-17 Sep 2013,

Garcia-Morchon, O., Keoh, S.L. , Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F. and Ziegeldorf, J.H. (2013) Securing the IP-based internet of things with HIP and DTLS. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, 17 Apr 2013, pp. 119-124. (doi: 10.1145/2462096.2462117)

Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G., Kumar, S.S. and Keoh, S.L. (2013) HIP security architecture for the IP-based internet of things. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 25-28 Mar 2013, pp. 1331-1336. (doi: 10.1109/WAINA.2013.158)

Brachmann, M., Keoh, S.L. , Morchon, O.G. and Kumar, S.S. (2012) End-to-end transport security in the IP-based internet of things. In: 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 Jul - 2 Aug 2012, pp. 1-5. (doi: 10.1109/ICCCN.2012.6289292)

Keoh, S.L. (2011) Efficient group key management and authentication for body sensor networks. In: IEEE International Conference on Communications (ICC), Kyoto, Japan, 5 - 9 Jun 2011, pp. 1-6. (doi: 10.1109/icc.2011.5962805)

Keoh, S.L. , Asim, M., Kumar, S.S. and Lenoir, P. (2011) Secure spontaneous emergency access to personal health record. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), San Francisco, CA, USA, 12 Jun 2011,

Keoh, S.L. , Lupu, E. and Sloman, M. (2009) Securing body sensor networks: sensor association and key management. In: IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA, 9-13 Mar 2009, pp. 1-6. (doi: 10.1109/PERCOM.2009.4912756)

Keoh, S.L. and Vrielink, K. (2009) An implementation experience of domain management in marlin. In: Nineth ACM Workshop on Digital Rights Management, Chicago, IL, USA, 9 Nov 2009, pp. 29-38. (doi: 10.1145/1655048.1655054)

Zhu, Y., Sloman, M., Lupu, E. and Keoh, S.L. (2009) Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009., London, UK, 1-3 Apr 2009, (doi: 10.4108/ICST.PERVASIVEHEALTH2009.5939)

Schaeffer-Filho, A., Lupu, E., Sloman, M., Keoh, S.L. , Lobo, J. and Calo, S. (2008) A role-based infrastructure for the management of dynamic communities. In: Second International Conference on Autonomous Infrastructure, Management and Security (AIMS), Bremen, Germany, 1-3 Jul 2008, pp. 1-14. (doi: 10.1007/978-3-540-70587-1_1)

Yanmin, Z., Keoh, S.L. , Sloman, M., Lupu, E., Yu, Z., Dulay, N. and Pryce, N. (2008) Finger: an efficient policy system for body sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Atlanta, GA, USA, 29 Sep - 2 Oct 2008, pp. 428-433. (doi: 10.1109/MAHSS.2008.4660033)

Zhu, Y., Keoh, S.L. , Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) An efficient policy system for body sensor networks. In: 14th IEEE International Conference on Parallel and Distributed Systems, 2008. ICPADS '08., Melbourne, Australia, 8-10 Dec 2008, pp. 383-390. (doi: 10.1109/ICPADS.2008.52)

Zhu, Y., Keoh, S.L. , Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) A policy system to support adaptability and security on body sensors. In: 5th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), Hong Kong, China, 1-3 Jun 2008, pp. 37-40. (doi: 10.1109/ISSMDBS.2008.4575010)

Keoh, S.L. , Dulay, N., Lupu, E., Twidle, K., Schaeffer-Filho, A.E., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Self-managed cell: a middleware for managing body-sensor networks. In: MobiQuitous 2007: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, PA, USA, 6-10 Aug 2007, pp. 1-5. (doi: 10.1109/MOBIQ.2007.4451009)

Keoh, S.L. et al. (2007) Policy-based management of body-sensor networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), Aachen, Germany, 26-28 March 2007, pp. 92-98.

Schaeffer-Filho, A., Lupu, E., Dulay, N., Keoh, S.L. , Twidle, K., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Towards supporting interactions between self-managed cells. In: SASO'07: First International Conference on Self-Adaptive and Self-Organizing Systems, Cambridge, MA, USA, 9-11 Jul 2007, pp. 224-236. (doi: 10.1109/SASO.2007.64)

Keoh, S.L. and Lupu, E. (2005) An efficient access control model for mobile ad-hoc communities. In: Second International Conference on Security in Pervasive Computing, Boppard, Germany, 5-8 April 2005, pp. 210-224. (doi: 10.1007/978-3-540-32004-3_21)

Keoh, S.L. , Lupu, E. and Sloman, M. (2004) PEACE: a policy-based establishment of ad-hoc communities. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, 6-10 Dec, 2004, pp. 386-395. (doi: 10.1109/CSAC.2004.26)

Keoh, S.L. and Lupu, E. (2004) Peer trust in mobile ad-hoc communities. In: 11th HP-OVUA Annual Planetary Workshop, Paris, France, 20-23 Jun 2004,

Keoh, S.L. and Lupu, E. (2002) Towards flexible credential verification in mobile ad-hoc networks. In: 2nd ACM International Workshop on Principles of Mobile Computing (POMC), Toulouse, France, 30-31 Oct, 2002, pp. 58-65. (doi: 10.1145/584490.584503)

Patents

Koninklijke Philips N.V. (2013) Methods, Devices and Systems for Establishing End-To-End Secure Connections and for Securely Communicating Data Packets. .

Koninklijke Philips N.V. (2013) System and Method for Access Decision Evaluation for Building Automation and Control Systems. .

Koninklijke Philips Electronics N.V. (2012) Secure Access to Personal Health Records in Emergency Situations. .

Koninklijke Philips N.V. (2012) Resource Metering System and Method Using Such a System for Smart Energy Consumption. .

This list was generated on Fri Apr 19 06:49:47 2024 BST.

Grants

  1. Inter-Networking of 5G and Wireless Networks (5G-X) for Optmised Smart Building Management
    IMDA and NRF Future Communications R&D Programme (FCP) Translational Grant
    Project Duration: 2022 - 2024
    Award: S$709,000 (including industry cash & in-kind contributions)
    Consortium: Singapore Institute of Technology (SIT), University of Glasgow (Singapore), University of Glasgow UK, Wi-SUN Alliance, Myrlabs (S) Pte Ltd, RFNet Technologies (S) Pte Ltd.

  2. An IoT-based Public Transport Data Collection and Analytics Framework using Bluetooth Proximity Beacons
    ICT Virtual Organisation of ASEAN Institutes and NICT (ASEAN IVO)
    Project Duration: 2022 - 2024
    Award: US$80,000
    Consortium: Universiti Teknologi Malaysia (UTM), University of Glasgow (Singapore), Universiti Teknologi Brunei (UTB), Universitas Brawijaya (Indonesia), Universiti Sains Malaysia (USM), Universiti Tunku Abdul Rahman (UTAR)
    Research papers: [PERCOM'16][ISC2'17][WF-IoT'19][ICBIR'23]

  3. MAISE: Multimodal AI-based Security at the Edge
    The PETRAS National Centre of Excellence for IoT Systems Cybersecurity
    Project Duration: 2021 - 2023
    Award: £222,000
    Consortium: University of Glasgow, UK, University of Glasgow (Singapore), STMicroelectronics S.r.l (Italy), Scottish Informatics and Computer Science Alliance (SICSA)
    Research papers: [APNOMS'20][IJCNN'23][IFIP CIP'23]

  4. Real-time Risk Assessment Assistance for Cooperative Mode (RaRaC) Using V2X for Vehicles and Pedestrian in Urban Conditions
    Singapore LTA Urban Mobility Grand Challenge
    Project Duration: 2021 - 2024
    Award: S$1.5mil

    Consortium: Singapore Institute of Technology (SIT), University of Glasgow (Singapore), Moovita Pte Ltd, Strides International
    Research papers: [VTC'21][TITS'22][ACCESS'22]

  5. GNSS Signal Authentication for Users of High Precision GNSS Positioning
    Singapore SNDGO TRANS Grant
    Project Duration: 2021 - 2022
    Award: S$796,584
    Consortium: Nanyang Technological University (NTU) Singapore, University of Glasgow (Singapore), University of Tokyo Japan, Singapore Land Authority (SLA)
    Research papers:[IFIP CIP'21]

  6. Research on Science & Technology Policy and its Operating Mechanism of Intelligent Manufacturing in South East Asia (东南亚“智能制造领域”科技与政策系统及其运行机制研究)
    International Science & Technology Organisation Cooperation Platform Construction Project of Belt and Road, China Association for Science & Technology(中国科协“一带一路”国际科技组织合作平台建设项目
    Project Duration: 2020 - 2021
    Consortium: Xiamen Huaqiao University 華僑大學 (China), Universiti TAR (Malaysia), National Institute of Development Administration (Thailand), ASEAN Academy of Engineering and Technology (Cambodia), Institution of Architects, Engineers and Surveyors (Brunei Darussalam), University of Glasgow (Singapore)

  7. Functional Risk for AV using AI Hybrid Deterministic Method
    Singapore Institute of Technology Ignition Grant
    Project Duration: 2019 - 2021
    Award: S$249,000
    Consortium: Singapore Institute of Technology, University of Glasgow (Singapore), Queen's University Belfast UK, Moovita Pte Ltd
    Research papers: [VTC'21][TITS'22][ACCESS'22]

  8. SIT@NYP Smart Living Lab
    Singapore Institute of Technology Grant
    Project Duration: 2019 - 2020
    Award: S$67,800
    Consortium: Singapore Institute of Technology, University of Glasgow (Singapore)

  9. EPSILON (ε): End-to-end Protection for Smart-metering Communication Infrastructure within a Local Field Area Network (FAN)
    Ministry of Education Translational R&D and Innovation Fund (MOE-TIF)
    Project Duration: 2016 - 2018
    Award: S$311,167
    Consortium: Republic Polytechnic Singapore, University of Glasgow (UofG, UGS), RFNet Technology and Wi-SUN Alliance
    Research papers: [IAS'14][IAS'15][ICSS'15][JIAS'16][ICSS'17][WF-IoT'18]

Supervision

  • Chia, Dan
    Recursive Risk Assessment Methodology for safer Autonomous vehicles
  • Xin, Xin
    Formal Verification of Safety Critical Systems with Uncertainty
  • Leong, Rech
    Quality Assessment and Trustworthy Artificial Intelligence
  • Leong, Rech
    Towards Cohesive Evaluation of Explainable Artificial Intelligence Algorithms

Teaching

1. Distributed Algorithms and Systems (DAS4) [Year 4, UofG BSc (Hons) Computing Science]
    Moodle page

2. Database Systems (DB3) [Year 3, UofG BSc (Hons) Computing Science]
    Moodle page

3. Data Structures and Algorithms [Year 1, SIT-UofG Joint Degree]
    xSite page

4. Team Project [Year 2, SIT-UofG Joint Degree]
    xSite page

5. Cloud and Distributed Computing [Year 2, SIT-UofG Joint Degree)
    xSite page

Additional information

Conferences / Workshops / Standards

  1. Governing Board Member, International Cyber Security and Datamining Society (ICSDS).
  2. Working Group Member, TR91:Cybersecurity labelling for consumer IoT, 2021.
  3. Workshop Co-chair, The IEEE World-Forum on Internet-of-Things (WF-IoT), Yokohama, Japan, 2022.
  4. Programme Co-chair, The 14th International Workshop on Artificial Intelligence and Cyber Security (AICS2021), Bali, Indonesia, 8 Dec 2021.
  5. Programme Co-chair, The 12th Cybersecurity Data Mining Competition (CDMC2021), Jul - Sep 2021.
  6. Programme Co-chair, Workshop on 5G Security: Current Trends, Challenges and New Enablers in conjunction with IEEE 5G World Forum 2020 and 2021 [Best Workshop Award in 2021].
  7. GRACE: Graceful Remediation with Authenticated Certificateless Encryption, Global Cities Team Challenge, 2018.

Invited Talks / Keynotes

  1. The need for Resilient and Reliable Precise GNSS, panel moderator, GNSS Industry Workshop hosted by Singapore Land Authority (SLA) and Singapore Space and Technology Limited (SSTL) in conjunction with Global Space and Technology Convention (GSTC), 8 Feb 2022.
  2. "Cybersecurity and its Importance in Industry 4.0", invited talk, hosted by Asian Federation of Engineering Organisation (AFEO) on Intelligent Smart Manufacturing Training: Introduction to Industrial Artificial Intelligence, 20 November 2021 [slides]
  3. "An IoT-based Public Transport Data Collection Framework using Bluetooth Proximity Beacons", ASEAN ICT Virtual Organisation (IVO) Forum, 18 November 2021 [slides] [Bronze Award]
  4. Artificial Intelligence for Urban Mobility in Southeast Asia, panel moderator, hosted by AISC Network, 12 October 2021
  5. Cyber Security Round Table Discussion, Organised by Pragma Singapore, 30 March 2021
  6. "Exploiting the Power of AI and IoT for Sustainable Intelligent Transportation System", Fireside chat, Artificial Intelligence for Sustainable Cities (AISC), 8 March 2021
  7. "Securing Edge and Internet-of-Things (IoT) in an A.I. World ", Invited Talk, AI x Cybersecurity Summit (ACSS2020) Youth Forum, Chongqing, China, 6 December 2020 [slides]
  8. "Internet-of-Things (IoT): Accelerating the Smart City Revolution", Keynote, IEEE Region 10 Humanitarian Technology Conference, Kuching, Sarawak Malaysia, 1 - 3 December 2020 [slides]
  9. "Smart Manufacturing in Singapore", Invited Talk, The 7th National Intelligent Manufacturing Conference (第七届全国智能制造学术会议), Xiamen, China, 7 November 2020 [slides]
  10. "Emerging Trends in Intelligent Edge Computing", Specially Invited Address, AIBotics Go-Digital-Webinar, Singapore, 3 September 2020 [slides]
  11. "Cyber Security and Its Importance in Industry 4.0", Invited Talk, WFEO-CIC International Seminar on Industry 4.0, Ipoh, Perak Malaysia, 12 July 2018
  12. "Security Management for Network-of-Things (NoT)", Keynote, IEEE/IFIP International Workshop on Decentralized Orchestration and Management of Distributed Heterogeneous Things (DOMINOS), Taipei, Taiwan,  23 April 2018