default search action
Huo-Chong Ling
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Veeramani Shanmugam, Huo-Chong Ling, Lenin Gopal, Sivaraman Eswaran, Choo W. R. Chiong:
Network-aware virtual machine placement using enriched butterfly optimisation algorithm in cloud computing paradigm. Clust. Comput. 27(6): 8557-8575 (2024) - [j9]Reng-Yi Kueh, Fu-Ee Tang, Huo-Chong Ling, Yee-Yong Tan, Carrie Lee-Ing Ho:
Evaluating Network Structures in Byzantine-based Consensus Algorithms for Sarawak's Digitalized Pepper Value Chain. J. Inf. Sci. Eng. 40(5): 943-955 (2024) - 2023
- [j8]Yuan Ju Teoh, Huo-Chong Ling, Wei Kitt Wong, Thomas Anung Basuki:
A Hybrid SVD-Based Image Watermarking Scheme Utilizing Both U and V Orthogonal Vectors for Robustness and Imperceptibility. IEEE Access 11: 51018-51031 (2023) - 2022
- [c13]Jack Hutchison, Duc-Son Pham, Sieteng Soh, Huo-Chong Ling:
Explainable Network Intrusion Detection Using External Memory Models. AI 2022: 220-233 - 2021
- [c12]Soon-Nyean Cheong, Huo-Chong Ling, Pei-Lee Teh:
Encrypted Steganography Quick Response Scheme for Unified Hotel Access Control System. ICSET 2021: 303-308
2010 – 2019
- 2017
- [j7]Yandan Wang, John See, Yee-Hui Oh, Raphael C.-W. Phan, Yogachandran Rahulamathavan, Huo-Chong Ling, Su-Wei Tan, Xujie Li:
Effective recognition of facial micro-expressions with video motion magnification. Multim. Tools Appl. 76(20): 21665-21690 (2017) - 2016
- [j6]Osamah Ibrahiem Abdullaziz, Vik Tor Goh, Huo-Chong Ling, KokSheik Wong:
AIPISteg: An active IP identification based steganographic method. J. Netw. Comput. Appl. 63: 150-158 (2016) - [j5]Adamu Muhammad Buhari, Huo-Chong Ling, Vishnu Monn Baskaran, KokSheik Wong:
Fast watermarking scheme for real-time spatial scalable video coding. Signal Process. Image Commun. 47: 86-95 (2016) - [c11]Yee-Hui Oh, Anh Cat Le Ngo, Raphael C.-W. Phan, John See, Huo-Chong Ling:
Intrinsic two-dimensional local structures for micro-expression recognition. ICASSP 2016: 1851-1855 - [c10]Adamu Muhammad Buhari, Huo-Chong Ling, Vishnu Monn Baskaran, KokSheik Wong:
Low complexity watermarking scheme for scalable video coding. ICCE-TW 2016: 1-2 - 2015
- [j4]Md. Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan, Wun-She Yap:
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum. centric Comput. Inf. Sci. 5: 19 (2015) - [j3]Adamu Muhammad Buhari, Huo-Chong Ling, Vishnu Monn Baskaran, KokSheik Wong:
Real-time high-resolution downsampling algorithm on many-core processor for spatially scalable video coding. J. Electronic Imaging 24(1): 013025 (2015) - [c9]Osamah Ibrahiem Abdullaziz, Vik Tor Goh, Huo-Chong Ling, KokSheik Wong:
Using IP identification for fragmentation resilient data embedding. ICCE-TW 2015: 11-12 - [c8]Yee-Hui Oh, Anh Cat Le Ngo, John See, Sze-Teng Liong, Raphael C.-W. Phan, Huo-Chong Ling:
Monogenic Riesz wavelet representation for micro-expression recognition. DSP 2015: 1237-1241 - 2014
- [j2]Soon-Nyean Cheong, Huo-Chong Ling, Pei-Lee Teh:
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system. Expert Syst. Appl. 41(7): 3561-3568 (2014) - 2011
- [j1]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
On the security of ownership watermarking of digital images based on singular value decomposition. J. Electronic Imaging 20(1): 010501 (2011) - [c7]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
On the Security of a Robust Watermarking Scheme Based on RDWT-SVD. FGIT 2011: 249-256 - [c6]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR. PSIVT (1) 2011: 257-266 - 2010
- [c5]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
Analysis on the Improved SVD-Based Watermarking Scheme. AST/UCMA/ISA/ACN 2010: 143-149
2000 – 2009
- 2009
- [c4]Huo-Chong Ling, Swee-Huay Heng, Bok-Min Goi:
Attacks on a Block Based SVD Watermarking Scheme. ITNG 2009: 371-375 - 2008
- [c3]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
Attacks on SVD-Based Watermarking Schemes. ISI Workshops 2008: 83-91 - 2005
- [c2]Raphael C.-W. Phan, Huo-Chong Ling:
On the Insecurity of the Microsoft Research Conference Management Tool (MSRCMT) System. CITA 2005: 75-79 - 2004
- [c1]Raphael Chung-Wei Phan, Huo-Chong Ling:
Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. IWDW 2004: 184-191
Coauthor Index
aka: Raphael Chung-Wei Phan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint