Lai Wen Xuan Jeremy | 2022, | Trusted Metering for Outsourced GPU Computations using Intel SGX. |
She Jiayu | 2022, | Traceability of Adversarial Samples across Distributed Copies of a Machine Learning Model. |
Yoke Kai Xin, | 2022, | Towards Enhancing Logo designs for robustness against attacks on deep learning models. |
Ang Kiang Yang | 2022, | Adversarial Machine Learning. |
Loh Wei Jie, Oscar | 2021, | Towards Explainable Machine Learning for Synthesized Speech Detection. |
Joyce Yeo Shuhui | 2021, | Secure collaborative decision making and data sharing. |
Yang Shuqi | 2021, | Exploration of path inference attacks in Trace Together. |
Lee Wei Kang | 2021, | Enhance Cybersecurity with Intel SGX and Trusted Platform Module. |
Zhang Tieze, | 2021, | Hybrid Trust Model in Secure Multi-party Computation using Intel SGX. |
Jackie Tan Jin Wei, | 2020, | DDoS Detection using Machine Learning Techniques. |
Glenice Tan Yu Xin, | 2020, | Evading Malware Classifer. |
Tan Mingrui, | 2020, | Adversarial Machine Learning. |
Fan Yuting, | 2020, | Virtual Cyber-physical Power System for Cybersecurity Experimentation. |
Sun Mingyang, | 2019, | Tools for Security Scenario Setup. |
Ong Heng Le, | 2019, | Aesthetic QR Code. |
Tan Wang Leng, | 2019, | Secure services over untrusted servers. |
Zhang Jiyi, | 2018, | Flipped-Adversarial Autoencoders. |
Dickson Tan Boon Keong, | 2018, | Privacy-preserving and robust gathering data from large number of users. |
Joshua Lee, | 2017, | Tools for Security Scenario Setup. |
Fiona Chang Wenxin, | 2017, | Web browser traffic generations for validation. |
Liu Kexin, | 2017, | Automated generation of smart contract transactions. |
Chen Yingjie, | 2017, | Privacy in machine learning. |
Huang Yue, | 2017, | Generating Adversarial Examples in Machine Learning Models. |
Zhang Mengdi, | 2016, | Security Scenario Setup Using Deterlab. |
Zhu Jiarui, | 2015, | Generation of Aesthetic QR code. |
Cai Xinlei, | 2015, | Sharing of encrypted structural datasets over untrusted storage server. |
Lim Wei Chee, | 2014, | Data hiding in the meta-data of XML-based documents. |
Ng Sok Cheng Priscilla, | 2014, | Redactable signature for XML documents. |
Chong Yun Long, | 2014, | Efficient Key Aggregation for Cloud Storage. |
Zhao Weixiang, | 2014, | Secure storage over untrusted servers. |
Zhang Xi, | 2014, | Multilayer data protection with untrusted server. |
Divyanshu Arora, | 2014, | . |
Quek Jun Hao, | 2013. | Tagged-MapReduce for Controlling Sensitive Dataflow. |
Sim Jing Mei. | 2013. | Secure Collaborative Editing Through Malicious Server. |
Zeng Fanbin. | 2013. |
Randy Valentius Kamajaya, | 2013. |
Tan Yi Fan, | 2013. | Nice-looking 2D barcode. |
Phung Ngoc Thanh Phuong, | 2012, | Anonymization of Face Images. |
Hu He, | 2012, | Real-time collaborative editing with low-cost servers. |
Aditya Babel, | 2011, | The theory of elliptic curves in pairing based cryptography and a traitor tracing protocol. |
Bryan Chen, | 2011, | Using augmented reality for authentication. |
Nguyen Quang Huy, | 2011, | Peer-2-peer backup. |
Bilgehan Sahin, | 2010, | Data forensic on mobile devices. |
Thng Boon Hui, | 2010, | Information leakage from Metadata. |
Ng Kian Yong, | 2010, | Monitoring text chat applications on a Google mobile phone. |
Leung Chi Shun, | 2009, | The Vulnerability of Internet Users to Privacy and Semantic Attacks. |
Ryan Koh Jiarong, | 2009, | Approval of access control policy. |
Fang Chengfang, | 2008, | Information Leakage on Optimal Privacy-Preserving Generalization. |
Nicolas Ho, | 2008, | Residual Information of Redacted Images Hidden in the Compression Artifacts. |
Lim Chee Liang, | 2008, | Sanitizable Digital Signatures for Ordered Objects. |
Guo Muchuan, | 2008, | Privacy issues on secure sketch for asymmetric biometric representations. |
Loi Heok Gam, | 2007, | Locality perserving Hash. |
Nguyen Ngoc Hien, | 2007, | Encrypted domain Watermark Detector. |
Zhang Qinwei, | 2007, | Extraction consistent bits from fingerprint. |
............. | ...., | .... |
Wang Woon Keat | 2001, | Pseduo Power Signature. |
Tang Ming Hiang | 2001, | Image Watermarking. |