Geong Sen Poh
Geong Sen Poh
Cyber Security AI R & D
Verified email at - Homepage
Cited by
Cited by
Attribute based encryption with privacy protection and accountability for CloudIoT
J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang
IEEE Transactions on Cloud Computing 10 (2), 762-773, 2020
Searchable symmetric encryption: Designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
PrivHome: Privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing 18 (3), 1095-1107, 2019
Secure fine-grained encrypted keyword search for e-healthcare cloud
H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1307-1319, 2019
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
PrivDPI: Privacy-preserving encrypted traffic inspection with reusable obfuscated rules
J Ning, GS Poh, JC Loh, J Chia, EC Chang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications†…, 2019
Application of reinforcement learning for security enhancement in cognitive radio networks
MH Ling, KLA Yau, J Qadir, GS Poh, Q Ni
Applied Soft Computing 37, 809-829, 2015
LEAP: leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
J Ning, X Huang, GS Poh, J Yuan, Y Li, J Weng, RH Deng
Proceedings of the 2021 ACM SIGSAC conference on computer and communications†…, 2021
Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment
J Ning, X Huang, GS Poh, S Xu, JC Loh, J Weng, RH Deng
Computer Security–ESORICS 2020: 25th European Symposium on Research in†…, 2020
Application of reinforcement learning in cognitive radio networks: Models and algorithms
KLA Yau, GS Poh, SF Chien, HAA Al-Rawi
The Scientific World Journal 2014 (1), 209810, 2014
: Privacy-Preserving Integration and Sharing of Datasets
HW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
Trust and reputation management in cognitive radio networks: a survey
MH Ling, KLA Yau, GS Poh
Security and Communication Networks 7 (11), 2160-2179, 2014
Weighted entropy-based measure for image segmentation
WK Lai, IM Khan, GS Poh
Procedia Engineering 41, 1261-1267, 2012
A survey of privacy-preserving techniques for encrypted traffic inspection over network middleboxes
GS Poh, DM Divakaran, HW Lim, J Ning, A Desai
arXiv preprint arXiv:2101.04338, 2021
Update recovery attacks on encrypted database within two updates using range queries leakage
J Ning, GS Poh, X Huang, RH Deng, S Cao, EC Chang
IEEE Transactions on Dependable and Secure Computing 19 (2), 1164-1180, 2020
An efficient buyer-seller watermarking protocol based on chameleon encryption
GS Poh, KM Martin
International Workshop on Digital Watermarking, 433-447, 2008
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
PSI-stats: private set intersection protocols supporting secure statistical functions
JHM Ying, S Cao, GS Poh, J Xu, HW Lim
International Conference on Applied Cryptography and Network Security, 585-604, 2022
Design and analysis of fair content tracing protocols
GS Poh
Ph. D. Thesis, 2009
The system can't perform the operation now. Try again later.
Articles 1–20