Vik Tor Goh
Cited by
Cited by
Multiple error detection and correction based on redundant residue number systems
VT Goh, MU Siddiqi
IEEE Transactions on Communications 56 (3), 325-330, 2008
Identification of road surface conditions using IoT sensors and machine learning
JR Ng, JS Wong, VT Goh, WJ Yap, TTV Yap, H Ng
Computational science and technology, 259-268, 2019
Experimenting with an intrusion detection system for encrypted networks
V Goh, J Zimmermann, M Looi
International Journal of Business Intelligence and Data Mining 5 (2), 172-191, 2010
Towards intrusion detection for encrypted networks
VT Goh, J Zimmermann, M Looi
2009 International Conference on Availability, Reliability and Security, 540-545, 2009
Network packet payload parity based steganography
OI Abdullaziz, VT Goh, HC Ling, KS Wong
2013 IEEE Conference on Sustainable Utilization and Development in†…, 2013
Android based self-diagnostic electrocardiogram system for mobile healthcare
KY Choo, HC Ling, YC Lo, ZH Yap, JS Pua, RCW Phan, VT Goh
Technology and health care 23 (s2), S435-S442, 2015
Autonomous road potholes detection on video
JJ Koh, TTV Yap, H Ng, VT Goh, HL Tong, CC Ho, TY Kuek
Computational Science and Technology, 137-143, 2019
AIPISteg: An active IP identification based steganographic method
OI Abdullaziz, VT Goh, HC Ling, KS Wong
Journal of Network and Computer Applications 63, 150–158, 2016
Daily activities classification on human motion primitives detection dataset
ZH Chin, H Ng, TTV Yap, HL Tong, CC Ho, VT Goh
Computational Science and Technology, 117-125, 2019
Intrusion detection system for encrypted networks using secret-sharing schemes
V Goh, J Zimmermann, M Looi
Proceedings of 2nd International Cryptology Conference 2010, 126-132, 2010
A novel error correction scheme based on the Chinese Remainder Theorem
VT Goh, M Tinauli, MU Siddiqi
The Ninth International Conference on Communications Systems, 2004. ICCS 2004., 2004
Vehicle classification using convolutional neural network for electronic toll collection
ZJ Wong, VT Goh, TTV Yap, H Ng
Computational Science and Technology, 169-177, 2020
Simple and scalable blockchain with privacy
WK Chan, JJ Chin, VT Goh
Journal of Information Security and Applications 58, 102700, 2021
Detecting attacks in encrypted networks using secret-sharing schemes
V Goh, J Zimmermann, M Looi
International Journal of Cryptology Research 2 (1), 89-99, 2010
Exploratory graph analysis of the network data of the Ethereum blockchain
TTV Yap, TF Ho, H Ng, VT Goh
F1000Research 10 (908), 908, 2021
Intrusion detection framework for encrypted networks
VT Goh
Queensland University of Technology, 2010
Evolution of Bitcoin Addresses from Security Perspectives
WK Chan, JJ Chin, VT Goh
2020 15th International Conference for Internet Technology and Secured†…, 2020
A Machine Learning Approach to Predictive Modelling of Student Performance
H Ng, AA bin Mohd Azha, TTV Yap, VT Goh
F1000Research 10, 2021
A Study on Using Emojis in a Shoulder Surfing Resistant Authentication Method
MM Amer, YHS Kam, VT Goh
IT Convergence and Security, 65-77, 2021
Attention Models for Sentiment Analysis Using Objectivity and Subjectivity Word Vectors
WS Lee, H Ng, TTV Yap, CC Ho, VT Goh, HL Tong
Computational Science and Technology, 51-59, 2021
The system can't perform the operation now. Try again later.
Articles 1–20