Lam Kwok Yan (2) e

 

LAM, Kwok Yan

BSc London, PhD Cambridge

 

Associate Vice President (Strategy and Partnerships), President’s Office

Professor, College of Computing and Data Science

Nanyang Technological University,

Singapore

 

Email: kwokyan.lam@ntu.edu.sg

 

Professor Lam is the Associate Vice President (Strategy and Partnerships) and Professor in the College of Computing and Data Science at the Nanyang Technological University (NTU), Singapore. He is currently also the Executive Director of the Digital Trust Centre Singapore (DTC) and the Singapore AI Safety Institute. From August 2020, Professor Lam was also on part-time secondment to the INTERPOL as a Consultant at Cyber and New Technology Innovation. He served as the Director of the Strategic Centre for Research in Privacy-Preserving Technologies and Systems (SCRiPTS) 2018-2025, Director of NTU’s SPIRIT Smart Nation Research Centre 2016-2025, Director of the Nanyang Technopreneurship Center 2019-2022, and as Program Chair (Secure Community) of the Graduate College at NTU 2017-2019. Professor Lam has been a Professor of the Tsinghua University, PR China (2002-2010) and a faculty member of the National University of Singapore and the University of London since 1990. He was a visiting scientist at the Isaac Newton Institute of the Cambridge University and a visiting professor at the European Institute for Systems Security. In 2018, Professor Lam founded TAU Express Pte Ltd, an NTU start-up which specializes in AI and Data Analytics technologies for Smart Cities applications. TAU is a spin-off of the Intelligent Case Retrieval System project, a collaboration between NTU and the Singapore Supreme Court. In 1997, he founded PrivyLink International Ltd, a spin-off company of the National University of Singapore, specializing in e-security technologies for homeland security and financial systems. In 2012, he co-founded Soda Pte Ltd which won the Most Innovative Start Up Award at the RSA 2015 Conference. In 1998, he received the Singapore Foundation Award from the Japanese Chamber of Commerce and Industry in recognition of his R&D achievement in Information Security in Singapore.  Prof Lam received his B.Sc. (First Class Honours) from the University of London in 1987 and his Ph.D. from the University of Cambridge in 1990. His research interests include Distributed Systems, IoT Security Infrastructure and Cyber-Physical System Security, Distributed Protocols for Blockchain, Biometric Cryptography, Quantum Computing, Homeland Security and Cybersecurity. In 2020, he authored a Technical Report on the “Application of Quantum Computers for Law Enforcement and Security Communications” for a Singapore Government ministry. Professor Lam is the recipient of the 2022 Singapore Cybersecurity Hall of Fame Award.

Latest News

·       CFP: The 2nd ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, Co-located with the 32nd ACM Conference on Computer and Communications Security (CCS) 2025, Taipei, Taiwan, October 13, 2025.

·       CFP: ESORICS Workshop 2025: Workshop on Secure and Trustworthy Machine Unlearning Systems, Co-located with ESORICS 2025, Toulouse, France, 25-26 September 2025. https://www.ntu.edu.sg/dtc/esorics-workshop.

·       The DTC Singapore Innovation Grant Call will open on 17 June 2024 (submission deadline 16 August 2024 - Closed).

·       The Digital Trust Centre Singapore (DTC) has been designated as Singapore’s AI Safety Institute (AISI), 22 May 2024.c

·       Special Issue on “Digital Trust for Artificial Intelligence”, IEEE Transactions on Emerging Topics in Computational Intelligence (CFP Deadline for manuscripts submission January 1, 2025 - Closed).

·       Special Issue on “Cognitive and Intelligent Internet-of-Things for 5G-Enabled Smart City”, IEEE Wireless Communications (CFP Deadline for manuscripts submission January 15, 2021 - Closed).

·       Special Issue on “Advances and Challenges in Satellite-Based Industrial Internet-of-Things”, IEEE Transactions on Industrial Informatics (CFP Deadline for manuscripts submission extended to January 31, 2020 - Closed).

Current and Past Appointments

·       2022- , Associate Vice President (Strategy and Partnerships), President’s Office, NTU

·       2024- , Executive Director, Singapore AI Safety Institute

·       2022- , Executive Director, Digital Trust Centre Singapore (DTC)

·       2020- , Consultant on Cyber and New Technologies, INTERPOL

·       2015- , Professor, College of Computing & Data Science, NTU

·       2019-2022 , Director, Nanyang Technopreneurship Center, NTU

·       2002-2010, Professor, School of Software, Tsinghua University, China

·       1997-2002, Associate Professor, National University of Singapore

·       1995-1997, Senior Lecturer, National University of Singapore

·       1992-1995, Lecturer, National University of Singapore

·       1990-1992, Lecturer, Royal Holloway, University of London

Education

·       1987-1990, Ph.D., Computer Laboratory, University of Cambridge, U.K.

·       1984-1987, B.Sc. in Computer Science (First Class Honours), University of London, U.K.

Awards and Scholarships

·       Nanyang Award for Innovation & Entrepreneurship, Nanyang Technological University, 2023.

·       Asia’s Most Influential Scientist Award, Fortune Times, 2022.

·       Singapore Cybersecurity Hall of Fame Award, Association of Information Security Professionals, 2022.

·       SPRING Singapore Merit Award, SPRING Singapore, 2016

·       Most Innovative Start-Up Award, RSA Conference, 2015

·       Singapore Foundation Award (Research & Development), Japanese Chamber of Commerce and Industry, 1995

·       Cambridge Hong Kong Scholarship, Cambridge Commonwealth Trust, 1987-1990

·       Overseas Research Student Award, British Government, 1987-1990

Selected Professional Activities

·       Associate Editor, IEEE Transactions on Information Forensics and Security, March 2024 -.

·       Associate Editor, IEEE Transactions on Dependable and Secure Computing, December 2023 -.

·       Guest Editor, IEEE Transactions on Emerging Topics in Computational Intelligence (Special Issue on “Digital Trust for Artificial Intelligence”), 2024-2025.

·       Coach (Future of Policing and Criminal Investigations), 2nd INTERPOL Young Global Police Leaders Programme (YGPLP), Dubai, United Arab Emirates, 13-17 March 2022.

·       Steering Committee Member, National Satellite of Excellence (NSoE) Steering Committee in Design Science & Technology for Secure Critical Infrastructure (DeST-SCI), Singapore University of Technology and Design, 1 July 2019 – 30 June 2022.

·       Independent Reviewer, Dutch Research Council (NWO), August 2019.

·       External Reviewer, Research Grants Council (RGC) of Hong Kong, February 2019.

·       Guest Editor, IEEE Wireless Communications (Special Issue on “Cognitive and Intelligent Internet-of-Things for 5G-Enabled Smart City”), 2020-2021.

·       Guest Editor, IEEE Transactions on Industrial Informatics (Special Issue on “Advances and Challenges in Satellite-Based Industrial Internet-of-Things”), 2019-2020.

·       Chair, Cyber Security WG, SDE Technology Roadmap, Infocomm and Media Development Authority, Singapore, 2018 – 2019

·       Technical Committee Member, SDE Technology Roadmap, Infocomm and Media Development Authority, Singapore, 2018 – 2019

·       Reviewer for Journal, Nature

·       Reviewer for ACM Computing Surveys

·       Reviewer for IEEE Transactions on Communications

·       Reviewer for IEEE Systems Journal

·       Reviewer for IEEE Wireless Communications Magazine

·       Reviewer for IEEE Network Magazine

·       Reviewer for IEEE Computer Magazine

·       Reviewer for IEEE Internet of Things Journal

·       Reviewer for IEEE Access

·       Reviewer for IEEE Transactions on Circuits and Systems for Video Technology

·       Reviewer for IEEE Transactions on Aerospace and Electronic Systems

·       Reviewer for IEEE Transactions on Cognitive Communications and Networking

·       Reviewer for IEEE Journal of Emerging and Selected Topics in Power Electronics

·       Reviewer for IEEE Transactions on Industrial Informatics

·       Reviewer for IEEE Transactions on Vehicular Technology

·       Reviewer for IEEE Transactions on Intelligent Transportation Systems

·       Reviewer for IET Radar, Sonar and Navigation

·       Reviewer for Journal of Parallel and Distributed Computing

·       Reviewer for Journal, Computers and Security

·       Reviewer for International Journal of Critical Infrastructure Protection

·       External Examiner for Master of Data Science, The University of Hong Kong, 2019-2020.

·       External Examiner for Bachelor of Computer Science (Cyber Security) (Hons.) Programme, College of Computer Science and Information Technology, Universiti Tenaga Nasional (UNITEN, Malaysia, January 2018 – December 2019

·       External Reviewer, Singapore Ministry of Education (MOE) Innovation Fund Evaluation Panel (IFEP), August 2017

Recent and Selected Projects

·       Lead Principal Investigator, AI Safety & Governance Capabilities & Capacity Building, Funded by Infocomm and Media Development Authority ($10,000,000), March 2025 – February 2028.

·       Lead Principal Investigator, The Ant-NTU Joint Lab for Privacy-Preserving Technologies and Digital Trust, Funded by Ant Group ($5,000,000), July 2024 – June 2029.

·       Lead Principal Investigator, The Mastercard-NTU Joint Lab for advanced research in Cybersecurity and Digital Trust, Funded by Mastercard ($5,000,000), February 2023 – January 2028.

·       Principal Investigator, Spectrum Optimization and Mobility Management for LEO Satellite Internet-of-Things ($988,000), Funded by SUTD Future Communications Research & Development Programme (FCP), November 2022 – April 2025.

·       Lead Principal Investigator, National Centre for Research in Digital Trust, funded by Infocomm and Media Development Authority (S$50,000,000), October 2022 – September 2027.

·       Lead Principal Investigator, Strategic Centre for Research in Privacy-Preserving Technologies & Systems, top-up funding by Infocomm and Media Development Authority (S$5,300,000), April 2021 – March 2025.

·       Lead Principal Investigator, TRANS Lab SPIRIT Phase 2, Translational R&D for Application to Smart Nation & Digital Government ($12,000,000), April 2021-March 2025.

·       Principal Investigator, Smart Nation Internet-of-Things System Threat Analytics, funded by Cyber Security Agency of Singapore, Ministry of Communications and Information ($4,467,400), March 2021 – March 2024.

·       Lead Principal Investigator, Strategic Centre for Research in Privacy-Preserving Technologies & Systems, funded by Infocomm and Media Development Authority (S$10,000,000), November 2018 – October 2023.

·       Principal Investigator, Smart Nation IoT Security Reference Architecture Study, funded by Cyber Security Agency of Singapore, Ministry of Communications and Information (S$780,000), May 2018 – December 2020.

·       Co-Lead Principal Investigator, Risk Assessment for Industrial Control Systems, National Cybersecurity R&D (NCR) Grant Call 2016, funded by National Research Foundation (S$1,211,520), October 2017 – September 2019.

·       Co-Lead Principal Investigator, Cybersecurity Protocol and Mechanism for e-Logistics of Dangerous Goods Tracking Using Blockchain, National Cybersecurity R&D (NCR) Grant Call 2016, funded by National Research Foundation (S$989,280), September 2017 – August 2019.

·       Principal Investigator, ExPReSS: Extensible Platform for Retrieval and Summarization Support, NTUITIVE GAP FUND GRANT (S$250,000), July 2017 – March 2019.

·       Lead Principal Investigator, Smart Platform Infrastructure Research on Integrative Technologies (SPIRIT), Translational R&D for Application to Smart Nation, funded by National Research Foundation (S$11,000,000), September 2016 – March 2021.

Recent and Selected Papers

Journal

1.      F. Li, Y. Wang, K.Y. Lam, B. Shen and L. Wang. “A Secure Dynamic Spectrum Access Scheme for Internet-of-Things With Swarm Learning”, IEEE Internet of Things Journal, IEEE. https://doi.org/10.1109/JIOT.2025.3583710.

2.      B. Karunanayake, I. Khalil, X. Yi and K.Y. Lam. “Toward LLM-driven Adaptive Policy Orchestration for Host-based Intrusion Detection Systems in IoT Environments”, IEEE Network Magazine, IEEE. https://doi.org/10.1109/MNET.2025.3579532.

3.      B. Shen, K.Y. Lam, F. Li and L. Wang. “Privacy-Aware Spectrum Pricing and Power Control Optimization for LEO Satellite Internet-of-Things”, IEEE Transactions on Wireless Communications, IEEE. https://doi.org/10.1109/TWC.2025.3574172.

4.      Y. Hou, Y. Cao, H. Xiong, D. He, C.H. Chi and K.Y. Lam. “Heterogeneous Parallel Key-Insulated Multi-Receiver Signcryption Scheme for IoV”, IEEE Transactions on Information Forensics & Security, IEEE. https://doi.org/10.1109/TIFS.2025.3567917.

5.      F. Li, J. Yang, K.Y. Lam, B. Shen and H. Luo. “A dynamic spectrum access scheme for Internet of Things with improved federated learning”, Journal of Network and Computer Applications, Vol. 239, July 2025, 104189, Elsevier. https://doi.org/10.1016/j.jnca.2025.104189.

6.      C. Shang, J. Cao, Z. Li, B. Niu, K.Y. Lam, C.H. Chi and H. Li. “A Hierarchical Encrypted Compression Scheme for Intra-Vehicle Network”, IEEE Transactions on Intelligent Transportation Systems, IEEE. https://doi.org/10.1109/TITS.2025.3558192.

7.      Z. Liu, H. Ye, Y. Jiang, J. Shen, J. Guo, I. Tjuawinata and K.Y. Lam. “Privacy-Preserving Federated Unlearning with Certified Client Removal”, IEEE Transactions on Information Forensics & Security, IEEE, Vol. 20, pp. 3966-3978, 2025. https://doi.org/10.1109/TIFS.2025.3555868.

8.      H. Ye, J. Guo, Z. Liu, Y. Jiang and K.Y. Lam. “Enhancing AI Safety of Machine Unlearning for Ensembled Models”, Applied Soft Computing Journal, Elsevier, Vol. 174, April 2025, 113011. https://doi.org/10.1016/j.asoc.2025.113011.

9.      Z. Liu, H. Ye, C. Chen, Y. Zheng and K.Y. Lam. “Threats, Attacks, and Defenses in Machine Unlearning: A Survey”, IEEE Open Journal of the Computer Society, IEEE. https://doi.org/10.1109/OJCS.2025.3543483.

10.  R. Tu, X. Kang, C.W. Tan, C.H. Chi and K.Y. Lam. “All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval”, IEEE Transactions on Information Forensics & Security, IEEE, vol. 20, pp. 1695-1709. https://doi.org/10.1109/TIFS.2025.3534585.

11.  Y. Jiang, J. Shen, Z. Liu, C.W. Tan and K.Y. Lam. “Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning”, IEEE Transactions on Information Forensics & Security, IEEE. https://doi.org/10.1109/TIFS.2025.3533907.

12.  D. Wang, Y. Cao, K.Y. Lam, C.H. Chi, and K.K.R. Choo. “An Accountable GAKA Protocol With Changeable Thresholds and Verifiable Shares in UAVs-assisted IoVs for Emergency Rescue”, IEEE Transactions on Intelligent Transportation Systems, IEEE, Vol. 26, Issue 4, pp. 5522-5537, April 2025. https://doi.org/10.1109/TITS.2025.3531383.

13.  G. Huang, M.B. Westover, E.K. Tan, H. Wang, D. Cui, W.Y. Ma, T. Wang, Q. He, H. Wei, N. Wang, Q. Tian, K.Y. Lam, X. Yao and T.Y. Wong. “Artificial Intelligence without Restriction Surpassing Human Intelligence with Probability One: Theoretical Insight into Secrets of the Brain with AI Twins of the Brain”, Neurocomputing, December 2024, 129053, Elsevier. https://doi.org/10.1016/j.neucom.2024.129053

14.  X. Gong, S. Li, Y. Chen, M. Li, R. Wei, Q. Wang and K.Y. Lam. “Augmenting Model Extraction Attacks against Disruption-Based Defenses”, IEEE Transactions on Information Forensics & Security, IEEE, Vol. 20, pp. 531-546. https://doi.org/10.1109/TIFS.2024.3515792.

15.  J. Fan, Z. Liu, H. Du, J. Kang, D. Niyato and K.Y. Lam. “Improving Security in IoT-Based Human Activity Recognition: A Correlation-Based Anomaly Detection Approach”, IEEE Internet of Things Journal, Vol. 12, Issue 7, pp. 8301-8315, April 2025. https://doi.org/10.1109/JIOT.2024.3501361.

16.  C. Shang, J. Cao, Y. Luo, B. Niu, L. Gan, K.Y. Lam and C.H. Chi. “A Vision of 3GPP Wireless Sensing for Intelligent Vehicles: Scenarios, Architectures, Security Challenges, Solutions, and Future Trends”, IEEE Network Magazine, IEEE, Vol. 39, No. 2, pp. 80-90, March 2025. https://doi.org/10.1109/MNET.2024.3480973.

17.  Y. He, F. Peng, R. Cai, Z. Yu, M. Long and K.Y. Lam. “Category-conditional Gradient Alignment for Domain Adaptive Face Anti-spoofing”, IEEE Transactions on Information Forensics & Security, IEEE. https://doi.org/10.1109/TIFS.2024.3486098.

18.  Z. Liu, Y. Jiang, W. Jiang, J. Guo, J. Zhao and K.Y. Lam. “Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation”, IEEE Transactions on Dependable and Secure Computing, IEEE. https://doi.org/10.1109/TDSC.2024.3476533.

19.  F. Li, W. Nie, K.Y. Lam and L. Wang. “Network Traffic Prediction Based on PSO-LightGBM-TM”, Computer Networks, Volume 254, December 2024, Elsevier. https://doi.org/10.1016/j.comnet.2024.110810.

20.  R. Liu, K.Y. Lam, W. Zhou, S. Wu, J. Zhao, D. Hu and M Gong. “STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario”, IEEE Transactions on Multimedia, IEEE, Vol. 27, pp. 2666-2681, 2025. https://doi.org/10.1109/TMM.2025.3535328.

21.  Z. Liu, Y. Jiang, J. Shen, M. Peng, K.Y. Lam, X. Yuan and X. Liu. “A Survey on Federated Unlearning: Challenges, Methods, and Future Directions”, ACM Computing Surveys, ACM. https://doi.org/10.1145/3679014.

22.  F. Li, J. Yang, K.Y. Lam, B. Shen and G. Wei. “Dynamic Spectrum Access for Mobile Internet-of-Things with Joint GNN and DQN”, Ad Hoc Networks, Elsevier, Vol. 163, 1 October 2024, 103596. https://doi.org/10.1016/j.adhoc.2024.103596.

23.  P. Si, R. Liu, L. Qian, J. Zhao and K.Y. Lam. “Post-Deployment Fine-Tunable Semantic Communication”, IEEE Transactions on Wireless Communications, IEEE, vol. 24, no. 1, pp. 35-50, Jan. 2025. https://doi.org/10.1109/TWC.2024.3433479.

24.  L. Wang, L. Che, K.Y. Lam, W. Liu and F. Li. “Mobile Traffic Prediction with Attention-Based Hybrid Deep Learning”, Physical Communication, Elsevier, June 2024. https://doi.org/10.1016/j.phycom.2024.102420.

25.  A. Kalapaaking, I. Khalil, X. Yi, K.Y. Lam, G.B. Huang, N. Wang. “Auditable and Verifiable Federated Learning Based on Blockchain-Enabled Decentralization”, IEEE Transactions on Neural Networks and Learning Systems, IEEE, vol. 36, no. 1, pp. 102-115, January 2025. https://doi.org/10.1109/TNNLS.2024.3407670.

26.  R. Liu, W. Zhou, T. Zhang, K. Chen, J. Zhao and K.Y. Lam. “Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models”, IEEE Transactions on Information Forensics & Security, IEEE, vol. 19, pp. 5207-5219, May 2024. https://doi.org/10.1109/TIFS.2024.3390609.

27.  D. Wang, Y. Cao, K.Y. Lam, Y. Hu, O. Kaiwartya. “Authentication and Key Agreement Based on Three Factors and PUF for UAVs-assisted Post-disaster Emergency Communication”, IEEE Internet of Things Journal, IEEE, vol. 11, no. 11, pp. 20457-20472, June 2024. http://doi.org/10.1109/JIOT.2024.3371101.

28.  T. Zhang, K.Y. Lam and J. Zhao. “Device Scheduling and Assignment in Hierarchical Federated Learning for Internet of Things”, IEEE Internet of Things Journal, IEEE, vol. 11, no. 10, pp. 18449-18462, May 2024. https://doi.org/10.1109/JIOT.2024.3362972.

29.  Z. Liu, J. Guo, W. Yang, J. Fan, K.Y. Lam and J. Zhao. “Dynamic User Clustering for Efficient and Privacy-Preserving Federated Learning”, IEEE Transactions on Dependable and Secure Computing, IEEE. https://doi.org/10.1109/TDSC.2024.3355458.

30.  K.Y. Lam, X. Lu, L. Zhang, X. Wang, H. Wang and S.Q. Goh. “Efficient FHE-based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service”, IEEE Transactions on Dependable and Secure Computing, IEEE. https://doi.org/10.1109/TDSC.2024.3353536.

31.  M. Yang, T. Guo, T. Zhu, I. Tjuawinata, J. Zhao and K.Y. Lam. “Local differential privacy and its applications: A comprehensive survey”, Computer Standards & Interfaces. Elsevier, Vol. 89, 2024, 103827. https://doi.org/10.1016/j.csi.2023.103827.

32.  L. Zhang, X. Wang, J. Wang, R. Pung, H. Wang and K.Y. Lam. “An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMTs Data Protection With Its Application to Pandemic Modelling”, IEEE Internet of Things Journal, IEEE, vol. 11, no. 9, pp. 15272-15284, May 2024. https://doi.org/10.1109/JIOT.2023.3348122.

33.  H. Ma, S. Huang, J. Guo, K.Y. Lam and T. Yang. “Blockchain-Based Privacy-Preserving Federated Learning for Mobile Crowdsourcing”, IEEE Internet of Things Journal, IEEE, vol. 11, no. 8, pp. 13884-13899, 15 April 2024. https://doi.org/10.1109/JIOT.2023.3340630.

34.  J. Fan, M. Xu, J. Guo, L.K. Shar, J. Kang, D. Niyato and K.Y. Lam. “Decentralized Multimedia Data Sharing in IoV: A Learning-based Equilibrium of Supply and Demand”, IEEE Transactions on Vehicular Technology, IEEE, Vol. 73, Issue 3, pp. 4035-4050, March 2024, DOI: 10.1109/TVT.2023.3322270.

35.  B. Huang, D. Chaki, A. Bouguettaya and K.Y. Lam. “A Survey on Conflict Detection in IoT-based Smart Homes”, ACM Computing Surveys, ACM, Vol. 56, Issue 5, pp. 1-40, November 2023. https://doi.org/10.1145/3629517.

36.  H. Yang, S. Zhang, A. Alphones, C. Chen, K.Y. Lam, Z. Xiong, L. Xiao and Y. Zhang. “An Advanced Integrated Visible Light Communication and Localization System”, IEEE Transactions on Communications, IEEE, DOI: 10.1109/TCOMM.2023.3309823.

37.  P. Si, L. Qian, J. Zhao and K.Y. Lam. “A Hybrid Framework of Reinforcement Learning and Convex Optimization for UAV-Based Autonomous Metaverse Data Collection”, IEEE Network, vol. 37, no. 4, pp. 248-254, July/August 2023, https://doi.org/10.1109/MNET.011.2300032.

38.  K.L. Tan, C.H. Chi and K.Y. Lam. “Survey on Digital Sovereignty and Identity: From Digitization to Digitalization”, ACM Computing Surveys, ACM, Vol. 56, Issue 3, pp. 1-36, October 2023. https://doi.org/10.1145/3616400.

39.  S. Zhang, K.Y. Lam, B. Shen, L. Wang and F. Li. “Dynamic Spectrum Access for Internet-of-Things with Hierarchical Federated Deep Reinforcement Learning”, Ad Hoc Networks, Elsevier. DOI: https://doi.org/10.1016/j.adhoc.2023.103257.

40.  T. Zhang, K.Y. Lam, J. Zhao and J. Feng. “Joint Device Scheduling and Bandwidth Allocation for Federated Learning over Wireless Networks”, IEEE Transactions on Wireless Communications, IEEE, vol. 24, no. 1, pp. 3-18, Jan. 2025. https://doi.org/10.1109/TWC.2023.3291701.

41.  F. Li, S. Zhang, K.Y. Lam, X. Liu and L. Wang. “Dynamic Spectrum Optimization for Internet-of-Things with Social Distance Model”, Wireless Network, Springer US, DOI: 10.1007/s11276-023-03358-w.

42.  T. Zhang, K.Y. Lam and J. Zhao. “Deep reinforcement learning based scheduling strategy for federated learning in sensor-cloud systems”, Future Generation Computer Systems, 2023, Elsevier. https://doi.org/10.1016/j.future.2023.03.009.

43.  J. Fan, W. Yang, Z. Liu, J. Kang, D. Niyato, K.Y. Lam, H. Du. “Understanding Security in Smart City Domains From the ANT-centric Perspective”, IEEE Internet of Things Journal, IEEE, Vol. 10, Issue 13, pp. 11199-11223, July 2023, DOI: 10.1109/JIOT.2023.3252040.

44.  Q. Li, X. Wang, Q. Pei, X. Chen and K.Y. Lam. “Consistency preserving database watermarking algorithm for decision trees”, Digital Communications and Networks (2023), Elsevier. https://doi.org/10.1016/j.dcan.2022.12.015.

45.  M. Yang, I. Tjuawinata, K.Y. Lam, T. Zhu, J. Zhao. “Differentially Private Distributed Frequency Estimation”, IEEE Transactions on Dependable and Secure Computing, IEEE, doi: 10.1109/TDSC.2022.3227654.

46.  T. Zhang, K.Y. Lam, J. Zhao, F. Li, H. Han, N. Jamil. “Enhancing Federated Learning with spectrum allocation optimization and device selection”, IEEE/ACM Transactions on Networking, IEEE, DOI: 10.1109/TNET.2022.3231986.

47.  M. Yang, K.Y. Lam, T. Zhu and C. Tang. “SPoFC: A framework for stream data aggregation with local differential privacy”, Concurrency and Computation: Practice and Experience, Wiley, https://doi.org/10.1002/cpe.7572.

48.  F. Li, L. Sun, K.Y. Lam, S. Zhang, Z. Sun, B. Peng, H. Xu and L. Zhang. “Segmentation of Human Aorta Using 3D nnU-Net-Oriented Deep Learning”, Review of Scientific Instruments, AIP Publishing, DOI: 10.1063/5.0084433.

49.  F. Li, Z. Sun, K.Y. Lam, S. Zhang, L. Sun and L. Wang. “Reputation-Based Power Allocation for NOMA Cognitive Radio Networks”, Wireless Network, Springer US, DOI: 10.1007/s11276-022-03139-x.

50.  K.L. Tan, C.H. Chi and K.Y. Lam. “Secure and Privacy-Preserving Sharing of Personal Health Records with Multi-Party Pre-Authorization Verification”, Wireless Network, Springer US, 2022, DOI: 10.1007/s11276-022-03114-6.

51.  H. Yang, K.Y. Lam, L. Xiao, Z. Xiong, H. Hu, D. Niyato and H.V. Poor. “Lead Federated Neuromorphic Learning for Wireless Edge Artificial Intelligence”, Nature Communications 13, 4269 (2022), DOI: 10.1038/s41467-022-32020-W (https://www.nature.com/articles/s41467-022-32020-w.pdf).

52.  Z. Liu, J. Guo, W. Yang, J. Fan, K.Y. Lam and J. Zhao. “Privacy-Preserving Aggregation in Federated Learning: A Survey”, IEEE Transactions on Big Data, July 2022, IEEE, DOI: 10.1109/TBDATA.2022.3190835.

53.  Q. Li, X. Wang, Q. Pei, K.Y. Lam, N. Zhang, M. Dong and V. Leung. “Database Watermarking Algorithm based on Decision Tree Shift Correction”, IEEE Internet of Things Journal, IEEE, Volume 9, Issue 23, pp. 24373-24387, December 2022, DOI:  10.1109/JIOT.2022.3188631.

54.  Y. Sun, H. Xiong, S.M. Yiu and K.Y. Lam. “BitAnalysis: A Visualization System for Bitcoin Wallet Investigation”, IEEE Transactions on Big Data, vol. 9, no. 2, pp. 621-636, 1 April 2023, IEEE, DOI: 10.1109/TBDATA.2022.3188660.

55.  M. Yang, I. Tjuawinata, K.Y. Lam. “K-means clustering with local -privacy for privacy-preserving data analysis”, IEEE Transactions on Information Forensics & Security, IEEE, Vol. 17, pp. 2524-2537, 2022, DOI: 10.1109/TIFS.2022.3189532.

56.  Z. Li, R. Cao, H. Li, K.Y. Lam, Y. Hu and A. Kot. “One-Class Knowledge Distillation for Face Presentation Attack Detection", IEEE Transactions on Information Forensics & Security, IEEE, Vol. 17, pp. 2137-2150, May 2022, DOI:10.1109/TIFS.2022.3178240.

57.  F. Li, B. Shen, J. Guo, K.Y. Lam, G. Wei and L. Wang. “Dynamic Spectrum Access for Internet-of-Things Based on Federated Deep Reinforcement Learning”, IEEE Transactions on Vehicular Technology, IEEE, Volume 71, Issue 7, pp. 7952-7956, DOI: 10.1109/TVT.2022.3166535.

58.  Z. Liu, J. Guo, K.Y. Lam and J. Zhao. “Efficient Dropout-resilient Aggregation for Privacy-preserving Machine Learning”, IEEE Transactions on Information Forensics & Security, IEEE, Vol. 18, pp. 1839-1854, 2023, DOI: 10.1109/TIFS.2022.3163592.

59.  H. Yang, J. Zhao, K.Y. Lam, Z. Xiong, Q. Wu and L. Xiao. “Distributed Deep Reinforcement Learning Based Spectrum and Power Allocation for Heterogeneous Networks”, IEEE Transactions on Wireless Communications, IEEE, March 2022, DOI: 10.1109/TWC.2022.3153175.

60.  Z. Li, H. Li, X. Luo, Y. Hu, K.Y. Lam and A. Kot. “Asymmetric Modality Translation For Face Presentation Attack Detection”, IEEE Transactions on Multimedia, IEEE, October 2021, DOI: 10.1109/TMM.2021.3121140.

61.  J. Li, Y. Li, C. Cao and K.Y. Lam. “Conditional Anonymous Authentication with Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles”, IEEE Internet of Things Journal, IEEE, Volume 9, Issue 11, pp. 8749-8762, June 2022, DOI: 10.1109/JIOT.2021.3116422.

62.  F. Li, K.Y. Lam, Z. Ni, D. Niyato, X. Liu and L. Wang. “Cognitive Carrier Resource Optimization for Internet-of-Vehicles in 5G-Enhanced Smart Cities”, IEEE Network Magazine, vol. 36, no. 1, pp. 174-180, January/February 2022, IEEE, DOI: 10.1109/MNET.211.2100340.

63.  H. Han, J. Zhao, W. Zhai, Z. Xiong, D. Niyato, M.Di Renzo, Q-V. Pham, W. Lu and K.Y. Lam. “Reconfigurable Intelligent Surface Aided Power Control for Physical-Layer Broadcasting”, IEEE Transactions on Communications, IEEE, August 2021, DOI: 10.1109/TCOMM.2021.3104871.

64.  C. Huang, Y. Zhao, H. Chen, X. Wang, Q. Zhang, Y. Chen, H.X. Wang and K.Y. Lam. zkRep: A Privacy-preserving Scheme for Reputation-based Blockchain System”, IEEE Internet of Things Journal, IEEE, Volume 9, Issue 6, pp. 4330-4342, March 15 2022, DOI: 10.1109/JIOT.2021.3105273.

65.  X. Liu, K.Y. Lam, F. Li, J. Zhao, L. Wang and T.S. Durrani. “Spectrum Sharing for 6G Integrated Satellite-Terrestrial Communication Networks Based on NOMA and CR”, IEEE Network Magazine, IEEE, Volume 35, Issue 4, pp. 28-34, July/August 2021, DOI: 10.1109/MNET.011.2100021.

66.  H. Yang, J. Zhao, Z. Xiong, K.Y. Lam, S. Sun and L. Xiao. “Privacy-Preserving Federated Learning for UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management”, IEEE Journal on Selected Areas in Communications, IEEE, Volume 39, No. 10, pp. 3144-3159, Oct. 2021, DOI: 10.1109/JSAC.2021.3088655.

67.  K.Y. Lam, S. Mitra, F. Gondesen, X. Yi. “ANT-Centric IoT Security Reference Architecture - Security-by-Design for Satellite-Enabled Smart Cities”, IEEE Internet of Things Journal, IEEE, April 2021, DOI: 10.1109/JIOT.2021.3073734.

68.  F Li, K.Y. Lam, Z Sheng, W. Lu, X. Liu and L. Wang. “Agent-Based Spectrum Management Scheme in Satellite Communication Systems”, IEEE Transactions on Vehicular Technology, IEEE, February 2021, DOI: 10.1109/TVT.2021.3059837.

69.  X. Li, L. Cheng, C. Sun, K.Y. Lam, X. Wang and F. Li. “Federated Learning Empowered Collaborative Data Sharing for Vehicular Edge Networks”, IEEE Network Magazine, IEEE, Volume 35, Issue 3, pp. 116-124, May/June 2021, DOI: 10.1109/MNET.011.2000558.

70.  Y. Zhao, J. Zhao, J. Kang, Z. Zhang, D. Niyato, S. Shi and K.Y. Lam. “A Blockchain-Based Approach for Saving and Tracking Differential-Privacy Cost”, IEEE Internet of Things Journal, IEEE, February 2021, DOI: 10.1109/JIOT.2021.3058209.

71.  M. Yang, I. Tjuawinata, K.Y. Lam, J. Zhao and L. Sun. “Secure Hot Path Crowdsourcing with Local Differential Privacy under Fog Computing Architecture”, IEEE Transactions on Services Computing, IEEE, November 2020, DOI:10.1109/TSC.2020.3039336.

72.  Y. Zhao, J. Zhao, M. Yang, T. Wang, N. Wang, L. Lyu, D. Niyato and K.Y. Lam. “Local Differential Privacy based Federated Learning for Internet of Things”, IEEE Internet of Things Journal, IEEE, November 2020, DOI:10.1109/JIOT.2020.3037194.

73.  T. Wang, J. Zhao, Z. Hu, X. Yang, X. Ren and K.Y. Lam. “Local Differential Privacy for Data Collection and Analysis”, Neurocomputing, Elsevier, October 2020, https://doi.org/10.1016/j.neucom.2020.09.073.

74.  M.B. Mollah, J. Zhao, D. Niyato, Y.L. Guan, C. Yuen, S. Sun, K.Y. Lam and L.H. Koh. “Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey”, IEEE Internet of Things Journal, IEEE, Volume 8, Issue 6, pp. 4157 – 4185, March 2021, DOI: 10.1109/JIOT.2020.3028368.

75.  A. Chattopadhyay, K.Y. Lam and Y. Tavva. “Autonomous Vehicle: Security by Design”, IEEE Transactions on Intelligent Transportation Systems, IEEE, Vol. 22, No. 11, pp. 7015-7029, November 2021, DOI: 10.1109/TITS.2020.3000797.

76.  L. Wang, K.Y. Lam, X. Liu and F. Li. “Resource Allocation in Satellite-Based Internet of Things Using Pattern Search Method”, IEEE Access, IEEE, Volume 8, pp. 110908 – 110914, 2020, DOI: 10.1109/ACCESS.2020.3002834.

77.  K.Y. Lam and C. Wilson. “Developing AI for Law Enforcement in Singapore and Australia”, Communications of the ACM, ACM, 63(4), pp62, April 2020, DOI: 10.1145/3378418.

78.  M. B. Mollah, J. Zhao, D. Niyato, K.Y. Lam, X. Zhang, A. Ghias, L.H. Koh, L. Yang. “Blockchain for Future Smart Grid: A Comprehensive Survey”, IEEE Internet of Things Journal, IEEE, DOI: 10.1109/JIOT.2020.2993601.

79.  H.Y. Ma, E. Huang and K.Y. Lam. “Blockchain-based mechanism for fine-grained authorization in data crowdsourcing”, Future Generation Computer Systems, Elsevier, 106 (2020), pp. 121–134, https://doi.org/10.1016/j.future.2019.12.037.

80.  F. Li, K.Y. Lam, X. Li, Z. Sheng and L. Wang. “Advances and Emerging Challenges in Cognitive Internet-of-Things”, IEEE Transactions on Industrial Informatics, IEEE, November 2019, DOI: 10.1109/TII.2019.2953246.

81.  X. Wang, Z. Na, K.Y. Lam, X. Liu, Z. Gao, F. Li and L. Wang. “Energy Efficiency Optimization for NOMA-Based Cognitive Radio With Energy Harvesting”, IEEE Access, IEEE, doi: 10.1109/ACCESS.2019.2940698, Volume 7, pp. 139172 – 139180, 2019.

82.  F. Li, K.Y. Lam, L. Meng and L. Wang. “Trading-Based Dynamic Spectrum Access and Allocation in Cognitive Internet of Things”, IEEE Access, IEEE, Volume 7, pp. 125952 – 125959, doi: 10.1109/ACCESS.2019.2937582.

83.  F. Li, K.Y. Lam, H.W. Chen, N. Zhao. “Spectral Efficiency Enhancement in Satellite Mobile Communications: A Game-Theoretical Approach”, IEEE Wireless Communications, IEEE, doi: 10.1109/MWC.001.1900160, 15 October 2019.

84.  F. Li, K.Y. Lam, K. Zhao, M. Jia, X. Li and L. Wang. “Spectrum Optimization for Satellite Communication Systems with Heterogeneous User Preferences”, IEEE Systems Journal, IEEE, doi: 10.1109/JSYST.2019.2910230, 26 April 2019.

85.  X. Yi, E. Bertino, F.Y. Rao, K.Y. Lam, S. Nepal and A. Bouguettaya. “Privacy-Preserving User Profile Matching in Social Networks”, IEEE Transactions on Knowledge and Data Engineering, IEEE, doi: 10.1109/TKDE.2019.2912748, 23 April 2019.

86.  X. Yi, Z. Tari, F. Hao, L.Q. Chen, J. Liu, K.Y. Lam, X.C., Yang, I. Khalil, A. Zomaya, “Efficient Threshold Password-Authenticated Secret Sharing Protocols for Cloud Computing”, Journal of Parallel and Distributed Computing, Springer, https://doi.org/10.1016/j.jpdc.2019.01.013, 15 February 2019.

87.  S. Badsha, X. Yi, I. Khalil, S. Nepal, D. Liu and K.Y. Lam. “Privacy Preserving User based Web Service Recommendations”, IEEE Access, IEEE, Volume 6, Issue 1, December, 2018, DOI 10.1109/ACCESS.2018.2871447.

88.  L. Wang, K.Y. Lam, M. Xiong, F. Li, X. Liu and J. Wang. “Spectrum Pricing for Cognitive Radio Networks with User's Stochastic Distribution”, Wireless Networks, Springer US, 16 July 2018, https://doi.org/10.1007/s11276-018-1799-8.

89.  F. Li, K.Y. Lam, J.Y. Hua, K Zhao, N. Zhao and L. Wang. “Improving Spectrum Management for Satellite Communication Systems with Hunger Marketing”, IEEE Wireless Communications Letters, IEEE, 17 January 2019, Doi: 10.1109/LWC.2019.2893659.

90.  F. Li, K.Y. Lam, Z. Sheng, X. Zhang, K. Zhao and L. Wang. “Q-Learning-Based Dynamic Spectrum Access in Cognitive Industrial Internet of Things”, Wireless Networks and Applications, Springer US, 11 September 2018, DOI 10.1007/s11036-018-1109-9.

91.  L. Wang, K.Y. Lam, M. Xiong, F. Li, X. Liu and J. Wang. “Spectrum Pricing for Cognitive Radio Networks with User's Stochastic Distribution”, Wireless Networks, Springer US, 16 July 2018, https://doi.org/10.1007/s11276-018-1799-8.

92.  F. Li, K.Y. Lam, N. Zhao, X. Liu, K. Zhao, and L. Wang. “Spectrum Trading for Satellite Communication Systems with Dynamic Bargaining,” IEEE Transactions on Communications, IEEE, Volume 66, Issue 10, pp. 4680 – 4693, Oct 2018, Doi: 10.1109/TCOMM.2018.2837909.

93.  S. Badsha, X. Yi, I. Khalil, D. Liu, S. Nepal, E. Bertino and K.Y. Lam. “Privacy Preserving Location-Aware Personalized Web Service Recommendations”, IEEE Transactions on Services Computing, 22 May 2018, Doi: 10.1109/TSC.2018.2839587.

94.  F. Li, K.Y. Lam, X. Li, X. Liu, L. Wang and C.M. Leung. “Dynamic Spectrum Access Networks with Heterogeneous Users: How to Price the Spectrum?”, IEEE Transactions on Vehicular Technology, IEEE, Volume 67, Issue 6, pp 5203 – 5216, June 2018, Doi10.1109/TVT.2018.2818749.

95.  F. Li, K.Y. Lam, L. Wang, Z. Na, X. Liu and Q. Pan. “Caching Efficiency Enhancement at Wireless Edges with Concerns on User's Quality of Experience”, Wireless Communications and Mobile Computing, Vol. 2018, Article ID 1680641, 10 pages, 2018. Doi:10.1155/2018/1680641.

96.  F. Li, K.Y. Lam and L. Wang. “Power allocation in cognitive radio networks over Rayleigh-fading channels with hybrid intelligent algorithms”, Wireless Networks, Volume 24, Issue 7, pp. 2397 – 2407, Oct 2018. Doi:10.1007/s11276-017-1476-3.

97.  F. Li, X. Liu, K.Y. Lam, Z. Na, J. Hua, J. Wang and L. Wang. “Spectrum Allocation with Asymmetric Monopoly Model for Multibeam-Based Cognitive Satellite Networks”, IEEE Access, IEEE, Volume 6, Issue 1, pp. 9713 – 9722, 2018. Doi: 10.1109/ACCESS.2018.2797278.

98.  A. Burg and A. Chattopadhyay and K.Y. Lam. “Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things”, Proceedings of the IEEE, IEEE, Volume: 106, Issue: 1, pp. 38 – 60, Jan. 2018. Doi: 10.1109/JPROC.2017.2780172.

99.  L. Wang, F. Li, X. Liu, K.Y. Lam, Z. Na and H. Peng. “Spectrum Optimization for Cognitive Satellite Communications with Cournot Game Model”, IEEE Access, IEEE, Volume 6, Issue 1, pp. 1624 – 1634, 2018. Doi: 10.1109/ACCESS.2017.2779804.

100.          F. Li, K.Y. Lam, J. Wang, X. Liu, K. Zhao and L. Wang. “Joint Pricing and Power Allocation for Multibeam Satellite Systems with Dynamic Game Model”, IEEE Transactions on Vehicular Technology, IEEE, Volume 67, Issue 3, pp. 2398 – 2408, March 2018. Doi: 10.1109/TVT.2017.2771770.

101.          P. Vikramkumar, A. Chattopadhyay and K.Y. Lam. “Secure and Lightweight Compressive Sensing using Stream Cipher”, IEEE Transactions on Circuits and Systems II, IEEE, Volume 65, Issue 3, pp. 371-375, March 2018. Doi: 10.1109/TCSII.2017.2715659.

 

 

Conference

1.      C.Y. Kwok, J.Q. Yip, Z. Qiu, C.H. Chi and K.Y. Lam. “Bona fide Cross Testing Reveals Weak Spot in Audio Deepfake Detection Systems”, The 26th Edition of the Interspeech Conference, August 17-21, 2025, Rotterdam, The Netherlands. Accepted.

2.      Y. Zheng, Z. Xie, G. Wang, Z. Liu, L. Lin and K.Y. Lam. “Why Multi-Interest Fairness Matters: Hypergraph Contrastive Multi-Interest Learning for Fair Conversational Recommender System”. The 63rd Annual Meeting of the Association for Computational Linguistics (ACL 2025), July 27 – 1 August 2025, Vienna, Austria. Accepted.

3.      Y. Zheng, M. Qian, G. Wang, Y. Liu, Z. Chen, M. Mao, L. Lin and K.Y. Lam. “HyperCRS: Hypergraph-Aware Multi-Grained Preference Learning to Burst Filter Bubbles in Conversational Recommendation System”, The 63rd Annual Meeting of the Association for Computational Linguistics (ACL 2025), July 27 – 1 August 2025, Vienna, Austria. Accepted.

4.      H. Zhang, P. Ding, Y. Wang, G. Liu, H. Wang and K.Y. Lam. “Towards Comprehensive and Prerequisite-Free Explainer for Graph Neural Networks”, Special Track on AI4Tech: AI Enabling Critical Technologies. The 34th International Joint Conference on Artificial Intelligence (IJCAI-25), 16-22 August 2025, Montreal, Canada. Accepted.

5.      Z. Lu, Q. Tang, T. Zhang, A. Feketa and K.Y. Lam. Asynchronous Dynamic Committee Proactive Secret Sharing for Large Data, The 45th IEEE International Conference on Distributed Computing Systems (ICDCS 2025), 20 – 23 July, Glasgow, Scotland, U.K. Accepted.

6.      X. Gong, M. Li, Y. Zhang, F. Ran, C. Chen, Y. Chen, Q. Wang and K.Y. Lam. “PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs”, The 34th USENIX Security Symposium, August 13–15, 2025, Seattle, WA, USA. https://www.usenix.org/conference/usenixsecurity25/presentation/gong-xueluan.

7.      X. Yang, Y. Wang, X. Zhang, S. Wang, H. Wang and K.Y. Lam. “A Macro- and Micro-Hierarchical Transfer Learning Framework for Cross-Domain Fake News Detection”, The Web Conference 2025 (WWW25) - The Web4Good Track, 28 April – 2 May 2025, Sydney Australia, pp. 5297 - 5307. https://doi.org/10.1145/3696410.3714517.

8.      Y. Wang, B. Shen, F. Li and K.Y. Lam. “Swarm Dynamic Spectrum Access for Internet-Of-Things”, 2025 IEEE Wireless Communications and Networking Conference (WCNC 2025), 24-27 March 2025, Milan, Italy, 2025, pp. 1-6. https://doi.org/10.1109/WCNC61545.2025.10978419.

9.      F. Li, S. Shen, K.Y. Lam, B. Shen and L. Wang. “Secure Dynamic Spectrum Access in Internet-of-Things Based on Machine Unlearning”, The 7th International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2025), 18-21 February 2025, Fukuoka, Japan. Accepted.

10.  F. Li, X. Chen, K.Y. Lam, B. Shen and L. Wang. “Federated-Learning-Based Wireless Traffic Prediction”, The 7th International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2025), 18-21 February 2025, Fukuoka, Japan. Accepted.

11.  Y. Jiang, X. Tong, Z. Liu, H. Ye, C.W. Tan and K.Y. Lam. “Efficient Federated Unlearning with Adaptive Differential Privacy Preservation”, The 2024 IEEE International Conference on Big Data (IEEE BigData 2024): Special Session on Federated Learning on Big Data, December 15-18, 2024, Washington DC, USA, pp. 7822-7831. https://doi.org/10.1109/BigData62323.2024.10825236.

12.  B. Shen, K.Y. Lam, W. Yang, Z. Liu and F. Li. “LEO Satellite-Enabled Networks: A Privacy-Preserving Framework for Spectrum Pricing and Power Control Optimization”, MSN Track 3: Security, Privacy, Trust, and Blockchain, The 20th International Conference on Mobility, Sensing and Networking (MSN 2024), December 20-22, 2024, Harbin, China. Accepted.

13.  Y. Zheng, R. Xu, G. Wang, L. Lin and K.Y. Lam. “Mitigating Matthew Effect: Multi-Hypergraph Boosted Multi-Interest Self-Supervised Learning for Conversational Recommendation”, The 2024 Conference on Empirical Methods in Natural Language Processing (EMNLP 2024), pp. 1455-1466, November 2024. https://aclanthology.org/2024.emnlp-main.86.

14.  B. Huang and K.Y. Lam. “A Survey on Physical Event Verification in User-centric Smart Home Systems”, The 1st International Workshop on Human Factors for Software Dependability co-located with the 35th IEEE International Symposium on Software Reliability Engineering (ISSRE 2024), 28-31 Oct, Tsukuba, Japan. 2024, pp. 263-270, IEEE. https://doi.org/10.1109/ISSREW63542.2024.00089.

15.  B. Shen, S.Q. Goh, K.Y. Lam and F. Li. “Efficient and Secure Federated Dynamic Spectrum Access for LEO Satellite Internet-of-Things”, 2024 IEEE 24th International Conference on Communication Technology, October 18-20, 2024, Chengdu, China, 2004, pp. 366-371. https://doi.org/10.1109/ICCT62411.2024.10946453.

16.  H. Ye, Z. Liu, Y. Jiang, J. Guo and K.Y. Lam. “Malicious Unlearning in Ensemble Models”, The 21st Annual International Conference on Privacy, Security & Trust (PST2024), 28-30 August 2024, Sydney, Australia, 2024, pp. 1-6. https://doi.org/10.1109/PST62714.2024.10788066.

17.  J. Cao, C. Shang, Z. Li, Y. Luo, K.Y. Lam, C.H. Chi and H. Li. “A Message-based Lightweight Session Key Distribution Scheme for Intra-Vehicle Network”, 2024 IEEE Global Communications Conference: Communication & Information Systems Security, December 8-12, 2024, Cape Town, South Africa. Accepted.

18.  Y. Jiang, C.W. Tan and K.Y. Lam. “Accelerating Federated Unlearning via Polyak Heavy Ball Method”, 2024 IEEE Information Theory Workshop (ITW), November 24-28, 2024, Shenzhen, China, pp. 235-240. https://doi.org/10.1109/ITW61385.2024.10807033.

19.  X. Yang, Y. Wang, X. Zhang, S. Wang, H. Wang and K.Y. Lam. “UPDATE: Mining User-News Engagement Patterns for Dual-Target Cross-Domain Fake News Detection”, Special Session on Private, Secure, and Trust Data Analytics (PSTDA2024) of The 11th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2024), October 6-10, 2024, San Diego, CA, United States. Accepted. (Winner of Best Paper Award). https://doi.org/10.1109/DSAA61799.2024.10722833.

20.  Q. Zheng, Y. Yu, S. Yang, J. Liu, K.Y. Lam and A. Kot. “Towards Physical World Backdoor Attacks against Skeleton Action Recognition”, The 18th European Conference on Computer Vision (ECCV 2024), Sept 29 – Oct 4, 2024, Milano, Italy. LNCS, vol. 15106, pp. 215-233. Springer, Cham.  https://doi.org/10.1007/978-3-031-73195-2_13.

21.  Y. Yu, Q. Zheng, S. Yang, W. Yang, J. Liu, S. Lu, Y.P. Tan, K.Y. Lam and A. Kot. “Unlearnable Examples Detection via Iterative Filtering”, The 33rd International Conference on Artificial Neural Networks (ICANN 2024), September 17–20, 2024, Lugano, Switzerland. LNCS, vol 15025. Springer, Cham. https://doi.org/10.1007/978-3-031-72359-9_18.

22.  P. Si, R. Liu, L. Qian, J. Zhao and K.Y. Lam. “Fine-Tunable Semantic Communication for Image Transmission”, The 10th International Conference on Big Data Computing and Communications (BigCom2024), 9-11 August, 2024, Dalian, Liaoning, P.R. China. Accepted. (Winner of Best Student Paper Award).

23.  B. Huang, C. Chen, K.Y. Lam and F. Huang. “Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach”, Workshop on Internet of Intelligent Service Systems (IISS) in the 2024 IEEE World Congress on Web Services (ICWS), July 7-13, 2024, Shenzhen, China. Accepted.

24.  T. Guo, S. Peng, Z. Zhang, M. Yang and K.Y. Lam. “Improving the accuracy of locally differentially private community detection by order-consistent data perturbation”, In Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’24), July 2024, pp. 1743-1752. https://dl.acm.org/doi/10.1145/3626772.3657836.

25.  J. Wang, Z. Liu, J. Nie, Y. Qi, C.H. Chi, K.Y. Lam. “Object-level Copy-Move Forgery Image Detection based on Inconsistency Mining”, Proceedings of the ACM on Web Conference 2024, May 2024, pp. 943–946. https://doi.org/10.1145/3589335.3651540.

26.  F. Li, W. Nie, K.Y. Lam, B. Shen and X. Li. “Network Traffic Prediction Using PSO-LightGBM-TM”, IEILM 2024: IEEE INFOCOM 2024 Workshop on Integrating Edge Intelligence and Large Model in Next Generation Networks, May 20, 2024, Vancouver, Canada. Accepted.

27.  J. Shen, W. Yang, Z. Chu, J, Fan, D. Niyato and K.Y. Lam. “Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning”, 2024 IEEE International Conference on Communications (ICC): Communication and Information System Security Symposium, 9-13 June 2024, Denver, CO, USA, 2024, pp. 2034-2039. https://doi.org/10.1109/ICC51166.2024.10622262.

28.  R. Liu, W. Zhou, S. Wu, J. Zhao and K.Y. Lam. “SSTA: Salient Spatially Transformed Attack”, The 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2024), 14-10 April 2024, Seoul, Korea, pp. 5910-5914, https://doi.org/10.1109/ICASSP48485.2024.10447882.

29.  Y. He, F. Peng, M. Long and K.Y. Lam. “Causality-Inspired Single-Source Domain Generalization for Face Anti-Spoofing”, The 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2024), 14-10 April 2024, Seoul, Korea, pp. 4925-4929, https://doi.org/10.1109/ICASSP48485.2024.10447694.

30.  S. Li, M. Ge, R. Feng, X. Li, and K.Y. Lam. “Automatic Detection and Analysis towards Malicious Behavior in IoT Malware”, Machine Learning for Cybersecurity Workshop (MLC), The 23rd IEEE International Conference on Data Mining (ICDM'23), 1-4 December, Shanghai, China, 2023, pp. 1332-1341, IEEE. https://doi.org/10.1109/ICDMW60847.2023.00171.

31.  V. Sachidananda, B. Chai, F. Gondesen, K.Y. Lam and Yang Liu. “Honey-Gauge: Enabling User-Centric Honeypot Classification”, The 3rd International Conference on Ubiquitous Security 2023 (UbiSec-2023), 1-3 November 2023, Exeter, UK, Communications in Computer and Information Science, Vol 2034. Springer, Singapore. https://doi.org/10.1007/978-981-97-1274-8_8.

32.  V. Sachidananda, S. Muneeswaran, Y. Liu and K.Y. Lam. “Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments”, in 2023 IEEE 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023), 1-3 Nov 2023, Exeter, United Kingdom, 2023, pp. 412-421. https://doi.org/10.1109/TrustCom60117.2023.00072.

33.  V. Sachidananda, B. Teo, R. Feng, K.Y. Lam and L. Yang, “FOCUS: Fatigue-Reducing IOCs Through Prioritization and Scoring,” 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC/PiCom/CBDCom/CyberSciTech), Abu Dhabi, United Arab Emirates, 2023, pp. 0020-0027, https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361355.

34.  V. Sachidananda, A. Sachdeva, R. Patil, K.Y. Lam and Y. Liu. “APTer: Towards the Investigation of APT Attribution”, The 2023 6th IEEE Conference on Dependable and Secure Computing (IEEE DCS 2023), November 7-9, 2023, Tampa, FL, USA, 2023, pp. 1-10, https://doi.org/10.1109/DSC61021.2023.10354155.

35.  J. Fan, M. Xu, Z. Liu, H. Ye, C. Gu, D. Niyato and K.Y. Lam. “A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles”, The 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), 10-13 October 2023, Hong Kong. https://doi.org/10.1109/VTC2023-Fall60731.2023.10333689.

36.  G. Zeng, J. Lai, Z. Huang, L. Zhang, X. Wang, K.Y. Lam, H. Wang and J. Weng. “Non-Interactive Zero-Knowledge Functional Proofs”, 2023 International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023), December 4-8, 2023, Guangzhou, China. LLNCS 14442, pp. 236–268, Springer. https://doi.org/10.1007/978-981-99-8733-7_8.

37.  P. Si, J. Zhao, K.Y. Lam and Q. Yang. “UAV-assisted Semantic Communication with Hybrid Action Reinforcement Learning”, The 2023 IEEE Global Communications Conference: : Next-Generation Networking and Internet (GLOBECOM 2022), December 4 – 8, 2023, Kuala Lumpur, Malaysia, pp 3801-3806, https://doi.org/10.1109/GLOBECOM54140.2023.10437643.

38.  R. Liu, J. Zhang, K.Y. Lam, J. Zhao and W. Zhou. “SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack”, The 2023 International Conference on Neural Information Processing (ICONIP2023), November 20-23, 2023, Changsha, China, LNCS 14451, pp 370-382, Springer. https://doi.org/10.1007/978-981-99-8073-4_29.

39.  N. Lee, U. Vasanthakumar, R. Chen, C. Lee, K.Y. Lam, S.C. Hui, R. Kow, B. Er, F.M. Tarmidzi and K.T. Aung. “Predictive Food Safety Risk Monitoring”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291540.

40.  U. Vasanthakumar, J.R.B. Goh, S.C. Hui, K.Y. Lam, B. Er, F.M. Tarmidzi and K.T. Aung. “Fine-tuning Pre-trained Language Model for Urgency Classification on Food Safety Feedback”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291215.

41.  I. Tjuawinata, Y. Zhao, B. Shen, K.Y. Lam and C.H. Chi. “Search and Permission Request over Encrypted Database”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291415.

42.  A. Gunawan, I. Tjuawinata, K.Y. Lam, C.H. Chi. “Decentralized Data Sharing using Searchable Encryption Database with Selective Data Retrieval”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291467.

43.  T. Zhang, K.Y. Lam and J. Zhao. “Device Scheduling and Bandwidth Allocation for Federated Learning over Wireless Networks”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291589.

44.  V. Sachidananda, R. Patil, H. Peng, Y. Liu and K.Y. Lam. “ThreatLand: Extracting Intelligence from Audit Logs via NLP methods”, The 20th International Conference on Privacy, Security, and Trust (PST 2023), 21-23 August 2023, Copenhagen, Denmark. https://doi.org/10.1109/PST58708.2023.10320173.

45.  C. Chen, Y. Wang, Y. Zhang, Q.Z. Sheng and K.Y. Lam. “Separate-and-Aggregate: A Transformer-based Patch Refinement Model for Knowledge Graph Completion”, The 19th International Conference on Advanced Data Mining and Applications (ADMA'23), Shenyang, China, 21-23 August, 2023, Lecture Notes in Computer Science, vol 14177. Springer, Cham. https://doi.org/10.1007/978-3-031-46664-9_5.

46.  K.Y. Lam, V. Cheng and Z.K. Yeong. “Applying Large Language Models for Enhancing Contract Drafting”, 3rd International Workshop on Artificial Intelligence and Intelligent Assistance for Legal Professionals in the Digital Workplace  (LegalAIIA 2023), 19 June 2023, Braga, Portugal, Vol. 3423, pp. 70-80, CEUR Workshop Proceedings. https://ceur-ws.org/Vol-3423/.

47.  C. Chen, Y. Wang, A. Sun, B. Li and K.Y. Lam. “Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge Graph Completion via Conditional Soft Prompting”, The 61st Annual Meeting of the Association for Computational Linguistics (ACL 2023) , July 9-14, 2023, Toronto, Canada, pp 11489–11503. https://doi.org/10.18653/v1/2023.findings-acl.729.

48.  A. Luqman, A. Chattopadhyay and K.Y. Lam. “Membership Inference Vulnerabilities in Peer to Peer Federated Learning”, The Inaugural AsiaCCS Workshop on Secure and Trustworthy Deep Learning Systems (SecTL 2023), 10 July 2023, Melbourne, Australia, ACM. https://doi.org/10.1145/3591197.3593638.

49.  Z. Liu, J. Guo, M. Yang, W. Yang, J. Fan and K.Y. Lam. “Privacy-Enhanced Knowledge Transfer with Collaborative Split Learning over Teacher Ensembles”, The Inaugural AsiaCCS Workshop on Secure and Trustworthy Deep Learning Systems (SecTL 2023), 10 July 2023, Melbourne, Australia, ACM. https://doi.org/10.1145/3591197.3591303. (Winner of Best Paper Award)

50.  W. Yang, Z. Chu, J. Fan, Z. Liu and K.Y. Lam. “A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security”, 9th ACM Cyber-Physical System Security Workshop (CPSS 2023), 10 July 2023, Melbourne, Australia, ACM. https://doi.org/10.1145/3592538.3594270.

51.  J. Fan, L.K. Shar, J. Guo, W. Yang, D. Niyato, K.Y. Lam. “Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks”, 16th International Conference on Network and System Security (NSS) 2022, December 9-12, 2022, Denarau Island, Fiji, , LNCS 13787, pp 283-304, Springer. https://doi.org/10.1007/978-3-031-23020-2.

52.  Q. Han, J. Zhao and K.Y. Lam. “Facial Landmark Predictions with Applications to Metaverse”, 2022 IEEE 8th World Forum on Internet of Things (WF-IOT 2022), October 26 – November 11, 2022, Yokohama, Japan, pp. 1-6, https://doi.org/10.1109/WF-IoT54382.2022.10152230.

53.  B. Huang, B. Zhang and Q.Z. Sheng and K.Y. Lam. “A Multi-task Learning Approach for Predicting Intentions Using Smart Home IoT Services”, The 20th International Conference on Service Oriented Computing (ICSOC), November 29 – 2 December 2022, Sevilla, Spain. In: Troya, J., Medjahed, B., Piattini, M., Yao, L., Fernández, P., Ruiz-Cortés, A. (eds) Service-Oriented Computing. ICSOC 2022. Lecture Notes in Computer Science, vol 13740. Springer, Cham. https://doi.org/10.1007/978-3-031-20984-0_29.

54.  C. Chen, Y. Wang, B. Li and K.Y. Lam. “Knowledge Is Flat: A Seq2Seq Generative Framework for Various Knowledge Graph Completion”, The 29th International Conference on Computational Linguistics (COLING 2022), October 12-17, 2022, Gyeongju, Republic of Korea. pp 4005-4017. https://aclanthology.org/2022.coling-1.352.

55.  P. Si, J. Zhao, H. Han, K.Y. Lam and L. Yang. “Resource Allocation and Resolution Control in the Metaverse with Mobile Augmented Reality”, The 2022 IEEE Global Communications Conference (GLOBECOM 2022), December 4 – 8, 2022, Rio de Janeiro, Brazil, pp. 3265-3271. https://doi.org/10.1109/GLOBECOM48099.2022.10001548.

56.  T. Zhang, Z. Li, Y. Chen, K.Y. Lam and J. Zhao. “Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised Learning”, The 15th IEEE International Conference on Internet of Things (iThings-2022), August 22-25, 2022, Espoo, Finland, pp. 77-84. DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00050.

57.  H. Yang, K.Y. Lam, J. Nie, J. Zhao, S. Garg, L. Xiao, Z. Xiong and M. Guizani. “3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks”, The Fifth IEEE Workshop on 5G and Beyond Wireless Security (5th Wireless-Sec 2021) held in Conjunction with the 2021 IEEE Global Communications Conference (GLOBECOM 2021), 2021, pp. 1-6, DOI: 10.1109/GCWkshps52748.2021.9681960. (Winner of Best Paper Award).

58.  J. Guo, Z. Liu, K.Y. Lam, J. Zhao and Y. Chen. “Privacy-Enhanced Federated Learning with Weighted Aggregation”, The 7th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2021), November 19-21, 2021, Fuzhou, China. https://doi.org/10.1007/978-981-16-7913-1_7.

59.   H. Yang, J. Zhao, K.Y. Lam, S. Garg, Q. Wu and Z. Xiong. “Deep Reinforcement Learning Based Resource Allocation for Heterogeneous Networks”, The 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2021), 2021, pp. 253-258, DOI: 10.1109/WiMob52687.2021.9606402.

60.  W.Z. Yang and K.Y. Lam. “Effective Anomaly Detection Model Training with Only Unlabeled Data by Weakly Supervised Learning Techniques”, The 23rd International Conference on Information and Communications Security (ICICS 2021), September 17-19, 2021, Chongqing, P.R. China, LNCS, Vol 12918. Springer, Cham. https://doi.org/10.1007/978-3-030-86890-1_23.

61.  H. Yang, J. Zhao, J. Nie, N. Kumar, K.Y. Lam and Z. Xiong, "UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation Based on Asynchronous Reinforcement Learning," IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2021, pp. 1-6, doi: 10.1109/INFOCOMWKSHPS51825.2021.9484604.

62.   Y. Zhao, J. Zhao, W. Zhai, S. Sun, D. Niyato, K.Y. Lam. “A Survey of 6G Wireless Communications: Emerging Technologies”, Future of Information and Communications Conference (FICC) 2021, April 29-30, 2021, Vancouver, Canada. https://doi.org/10.1007/978-3-030-73100-7_12.

63.   H. Yang, Y. Zhao, Z. Xiong, J. Zhao, D. Niyato, K.Y. Lam, Q. Wu. “Deep Reinforcement Learning Based Intelligent Reflecting Surface for Secure Wireless Communications”, GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020, pp. 1-6, doi: 10.1109/GLOBECOM42002.2020.9322615.

64.  Y. Huang, F. Wang, A.W.K. Kong and K.Y. Lam. “New Threats against Object Detector with Non-Local Block”, The 16th European Conference on Computer Vision (ECCV 2020), 23-28 August 2020, Springer LNCS 12365. https://doi.org/10.1007/978-3-030-58565-5_29.

65.  F. Gondesen, S. Mitra and K.Y. Lam. “Feasibility of PUF based Authentication on ATtiny devices with off-the-shelf SRAM”, The 6th ACM Cyber-Physical System Security Workshop (CPSS 2020), 6 October 2020, Taipei, Taiwan. pp 2-10, https://doi.org/10.1145/3384941.3409591.

66.  F. Li and K.Y. Lam. “Resource Optimization in Satellite-Based Internet of Things”, The 2nd International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2020), February 19-21, 2020, Fukuoka, Japan. IEEE, DOI: 10.1109/ICAIIC48513.2020.9065200.

67.  W.Z. Yang and K.Y. Lam. “Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC”, The 21st International Conference on Information and Communications Security (ICICS 2019), December 15-17, 2019, Beijing, P.R. China. (Winner of Best Student Paper Award). https://doi.org/10.1007/978-3-030-41579-2_9.

68.  T. Wang, X. Yang, X. Ren, J. Zhao and K.Y. Lam. “Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT”, The 38th International Performance Computing and Communications Conference (IPCCC 2019), 29-31 Oct 2019, London, UK. DOI: 10.1109/IPCCC47392.2019.8958751.

69.  X. Yi, K.Y. Lam, E. Bertino and F.Y. Rao. “Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation”, The 24th European Symposium on Research in Computer Security (ESORICS 2019), 23-27 September, 2019, Luxembourg. https://doi.org/10.1007/978-3-030-29962-0_19.

70.  X. Yi and K.Y. Lam. “A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity”, The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS 2019), July 7th – 2th, 2019, Auckland, New Zealand. DOI: 10.1145/3321705.3329816.

71.  Y. Huang, AWK Kong and K.Y. Lam. “Attacking Object Detectors without Changing the Target Object”, The 16th Pacific Rim International Conference on Artificial Intelligence (PRICA 2019), August 26th – 30th 2019, 2019, Yanuca Island, Cuvu, Fiji. https://doi.org/10.1007/978-3-030-29894-4_1.

72.  Y.W. Zhao, C. Wang, C.H. Chi, W-J. van den Heuvel, K.Y. Lam and S. Min. “Beyond the Power of Mere Repetition: Forms of Social Communication on Twitter through the Lens of Information Flows and Its Effect on Topic Evolution”, The 2019 International Joint Conference on Neural Networks (IJCNN), July 14-19, 2019, Budapest, Hungary. DOI: 10.1109/IJCNN.2019.8852290.

73.  J.L. Guo, W.Z. Yang, K.Y. Lam and X. Yi. “Using Blockchain to Control Access to Cloud Data”, The 14th International Conference on Information Security and Cryptology (Inscrypt 2018), December 14-17, 2018, Fuzhou, China, Springer LNCS 11449. https://doi.org/10.1007/978-3-030-14234-6_15.

74.  B. Srinivasu, P. Vikramkumar, A. Chattopadhyay and K.Y. Lam. “CoLPUF: A Novel Configurable LFSR-based PUF”, Proceedings of the 14th Asia Pacific Conference on Circuits and Systems (APCCAS 2018), October 26-30, 2018, Chengdu, China. Doi: 10.1109/APCCAS.2018.8605643.

75.  Y. Huang, A.W.K. Kong and K.Y. Lam. “From the Perspective of CNN to Adversarial Iris Images”, IEEE 9th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2018), October 22-25, 2018, Los Angeles, California, U.S. DOI: 10.1109/BTAS.2018.8698562.

76.  S. Bose, M. Raikwar, D. Mukhopadhyay, A. Chattopadhyay, K.Y. Lam. “BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICs”, The 2018 IEEE International Conference on Blockchain (Blockchain-2018), July 30 – 3 August 2018, Halifax, Canada. DOI: 10.1109/Cybermatics_2018.2018.00229.

77.  Y.W. Zhao, C. Wang, C.H. Chi, K.Y. Lam and S. Wang. “A Comparative Study of Transactional and Semantic Approaches for Predicting Cascades on Twitter”, Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI -18), July 13-19, 2018, Stockholm, Sweden, pp 1212-1218, doi:10.24963/ijcai.2018/169.

78.  V. Pudi, A. Chattopadhyay, K.Y. Lam. “Efficient and Lightweight Quantized Compressive Sensing Using Mu-Law”, 2018 IEEE International Symposium on Circuits and Systems (ISCAS 2018), May 27-30, 2018, Florence, Italy, IEEE. Doi: 10.1109/ISCAS.2018.8351505.

79.  M. Raikwar, S. Mazumdar, S. Ruj, S.S. Gupta, A. Chattopadhyay, K.Y. Lam. “A Blockchain Framework for Insurance Processes”, 1st International Workshop on Blockchains and Smart Contracts (BSC) in conjunction with the 9th IFIP International Conference on New Technologies, Mobility and Security (IFIP NTMS), February 26-28 2018, Paris, France, IEEE. Doi: 10.1109/NTMS.2018.8328731.

80.  A. Chattopadhyay and K.Y. Lam. “Security of autonomous vehicle as a cyber-physical system,” The 7th International Symposium on Embedded Computing and System Design (ISED), Durgapur, 18-20 December, 2017, pp. 1-6, IEEE. doi: 10.1109/ISED.2017.8303906.

81.  S Sau, J. Haj-Yahya, M.M. Wong, K.Y. Lam and A. Chattopadhyay. “Survey of Secure Processors”, 2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS 2017), 17-20 July, 2017, Pythagorion, Greece, IEEE. Doi: 10.1109/SAMOS.2017.8344637.

82.  V. Sidorov, W.K. Ng, K.Y. Lam, M.F. Bin Mohamed Salleh. “Implications of Cyber Threats for the Design of Unmanned Air Traffic Management System”, The 2017 International Conference on Unmanned Aircraft Systems (ICUAS’17), FL, USA, June 13-16 2017. DOI: 10.1109/ICUAS.2017.7991429.

83.  K.Y. Lam. Securing the Internet of Thing: Cybersecurity from IT to OT, Chapter in Navigating the Digital Age, 35-44, Forbes Media, 2016.

84.  K.Y. Lam, C.H. Chi. “Identity in the Internet-of-Things (IoT): New Challenges and Opportunities”, ICICS 2016: 18-26, Springer. https://doi.org/10.1007/978-3-319-50011-9_2.

 

Patents

1.      Lam Kwok Yan, et. al. Method for Generating Cryptographic Key from Biometric Data, Granted on 30 October 2009 (P-No. 139580). Singapore patent application number 200604906-8.

2.      Lam Kwok Yan, et. al. Methods of Robust Multi-Factor Authentication and Authorization and Systems Thereof, Granted on 31 July 2012 (P-No. 175860). Singapore patent application number 201108062-9.

3.      Lam Kwok Yan, et. al. Method and System of Secure Computing Environment having Auditable Control of Data Movement, Granted on 31 July 2013 (P-No. 185640). Singapore patent application number 201208478-6.

4.      Lam Kwok Yan, et. al. Method and System of Secure Computer File Management and Storage having High Level of Usability, Granted on 10 March 2016. Singapore patent application number/Patent Number 11201510347T.

5.     Lam Kwok Yan, et. al. Privacy-Preserving Neural Network Based on FHE Scheme, Fast Track Provisional Filing, 24 February 2022. Singapore provisional patent application number 10202201824W.

6.      Lam Kwok Yan, et. al. Optimization Of FHE Scheme For Non-Linear Functions: An Efficient Design For LUT-Based Non-Linear Function Evaluation, Fast Track Provisional Filing, 13 May 2022. Singapore provisional patent application number 10202205037W.

7.      Lam Kwok Yan, et. al. Privacy-Preserving Neural Network Model And Privacy-Preserving Prediction Using The Privacy-Preserving Neural Network Model, PCT Patent International Filing (claiming priority to earlier SG application nos. 10202201824W & 10202205037W), 15 February 2023, PCT Application No: PCT/SG2023/050085. International Publication No: WO 2023/163652 A2, 31 August 2023.

8.      Lam Kwok Yan, et. al. Efficient FHE-Based Training On Encrypted Data, 23 January 2024, Singapore provisional patent application number 10202400198U.

9.      Lam Kwok Yan, et. al. Two-Party Privacy-Preserving Subgraph Checking Over Unlabeled Graphs, 15 April 2024, Singapore provisional patent application number 10202401083W, PCT Application No: PCT/SG2025/050258, International Filing Date: 14 April 2025.

10.  Lam Kwok Yan, et. al. LEO Satellite IoT System Based On Deep Learning And Blockchain, 17 July 2024, Singapore provisional patent application number 10202402113X.

 

Research Students

·       Ph.D. Candidates

§  HUANG Yi: Designing Adversarial Signals Against Three Deep Learning and Non-deep Learning Methods (completed June 2021)

§  GUO Jiale: Privacy-enhancing Mechanisms for Security Data Access and Analysis (completed September 2022)

§  YANG Wenzhuo: Machine Learning Techniques for Advanced Cyber Attack Detection (completed August 2022)

§  TANG Kheng Leong (Part-time): Secure and Privacy Preserving Sharing of Personal Health Records with Multi-Party Pre-Authorization Verification (completed December 2022)

§  LI Zhi: Cross-domain Face Presentation Attack Detection Techniques with Attention to Genuine Faces (completed March 2023)

§  LIU Ziyao: MPC-Enabled Privacy-Preserving Machine Learning (completed May 2023)

§  CHEN Chen: Knowledge Graph Embedding with Deep Learning (completed February 2024)

§  ZHANG Tinghao: Optimization Strategy for Federated Learning (completed January 2025)

§  FAN Jiani: Enhancing Security and Efficiency for the Internet of Vehicles Systems (completed May 2025)

§  HUANG Elmo: Efficient Multi-Party Protocols for Distributed Systems

§  SI Peiyuan: Hybrid Convex Optimization and Reinforcement Learning Method for Communication Problems in Metaverse

§  PENG Minyi: Model-Based Machine Unlearning: Scenario Specific Approach for Effective Knowledge Removal and Privacy Protection

§  ZHENG Qichen: Investigating the Robustness of Dynamic Neural Networks against Energy-Oriented Attacks

§  YE Huanyi: Machine Unlearning for AI Safety

§  GOH Siqi: Privacy-Preserving Neural Network

§  LEE Nicholas: Deep Learning Techniques for Knowledge Graph Profiling

§  JIANG Weifeng: Towards Trustworthy and Interpretable LLM

§  PENG Hanli: AI Safety

§  ZHAO Yuqing: Privacy-Preserving Machine Learning and Explainable AI

§  Parventanus MURTHY: AI Safey

§  ZHOU Kaiyu (Part-time): AI Safety and Value Alignment

·       M.Eng. Candidates

§  HUANG Elmo (Part-time): Permissioned Blockchain for Data Provenance in the Supply Chain with Fine Grained Data Authorization (completed May 2021)

§  LIM Lucas (Part-time): Privacy Preserving Data Analytics in Financial Inclusion and Crowd Computing (completed May 2022)

§  SHEN Jiyuan: Data-Efficient and Privacy-Enhanced Knowledge Discovery (completed November 2024)

§  SHEN Bowen: Privacy-Preserving Resource Management in LEO Satellite Internet-of-Things (completed February 2025)

§  CHEN Yi: Safe AI for Next Generation Networks