|
LAM,
Kwok Yan BSc
London, PhD Cambridge Associate
Vice President (Strategy and Partnerships), President’s Office Professor,
College of Computing and Data Science Nanyang
Technological University, Singapore Email: kwokyan.lam@ntu.edu.sg |
Professor Lam is the Associate Vice President
(Strategy and Partnerships) and Professor in the College of Computing and Data
Science at the Nanyang Technological University (NTU), Singapore. He is
currently also the Executive Director of the Digital Trust Centre Singapore
(DTC) and the Singapore AI Safety Institute. From August 2020, Professor
Lam was also on part-time secondment to the INTERPOL as a Consultant at Cyber
and New Technology Innovation. He served as the Director of the Strategic Centre
for Research in Privacy-Preserving Technologies and Systems (SCRiPTS) 2018-2025, Director of NTU’s SPIRIT Smart Nation
Research Centre 2016-2025, Director of the Nanyang Technopreneurship
Center 2019-2022, and as Program Chair (Secure
Community) of the Graduate College at NTU 2017-2019. Professor Lam has been a Professor of
the Tsinghua University, PR China (2002-2010) and a faculty member of the
National University of Singapore and the University of London since 1990. He
was a visiting scientist at the Isaac Newton Institute of the Cambridge
University and a visiting professor at the European Institute for Systems
Security. In 2018, Professor Lam founded TAU Express Pte Ltd, an NTU start-up
which specializes in AI and Data Analytics technologies for Smart Cities
applications. TAU is a spin-off of the Intelligent Case Retrieval System
project, a collaboration between NTU and the Singapore Supreme Court. In 1997,
he founded PrivyLink International Ltd, a spin-off
company of the National University of Singapore, specializing in e-security
technologies for homeland security and financial systems. In 2012, he
co-founded Soda Pte Ltd which won the Most Innovative Start Up Award at the RSA
2015 Conference. In 1998, he received the Singapore Foundation Award from the
Japanese Chamber of Commerce and Industry in recognition of his R&D
achievement in Information Security in Singapore. Prof Lam received his B.Sc. (First Class Honours) from the University of London in 1987 and his
Ph.D. from the University of Cambridge in 1990. His research interests include
Distributed Systems, IoT Security Infrastructure and Cyber-Physical System
Security, Distributed Protocols for Blockchain, Biometric Cryptography, Quantum
Computing, Homeland Security and Cybersecurity. In 2020, he authored a
Technical Report on the “Application of Quantum Computers for Law Enforcement
and Security Communications” for a Singapore Government ministry. Professor Lam
is the recipient of the 2022 Singapore Cybersecurity Hall of Fame Award.
·
CFP: The 2nd ACM Workshop on
Large AI Systems and Models with Privacy and Safety Analysis, Co-located
with the 32nd ACM Conference on Computer and Communications Security
(CCS) 2025, Taipei, Taiwan, October 13, 2025.
·
CFP:
ESORICS Workshop 2025: Workshop
on Secure and Trustworthy Machine Unlearning Systems, Co-located with
ESORICS 2025, Toulouse, France, 25-26 September 2025.
https://www.ntu.edu.sg/dtc/esorics-workshop.
·
The DTC
Singapore Innovation
Grant Call will open on 17 June 2024 (submission deadline 16 August 2024 - Closed).
·
The Digital
Trust Centre Singapore (DTC) has been designated as Singapore’s
AI Safety Institute (AISI), 22 May 2024.c
·
Special Issue on “Digital Trust for Artificial
Intelligence”, IEEE Transactions on Emerging Topics in Computational
Intelligence (CFP
Deadline for manuscripts submission January 1, 2025 -
Closed).
·
Special Issue on “Cognitive and Intelligent
Internet-of-Things for 5G-Enabled Smart City”, IEEE Wireless Communications (CFP
Deadline for manuscripts submission January 15, 2021 -
Closed).
·
Special
Issue on “Advances and Challenges in Satellite-Based Industrial
Internet-of-Things”, IEEE Transactions on Industrial Informatics (CFP
Deadline for manuscripts
submission extended to January 31, 2020 - Closed).
·
2022- ,
Associate Vice President (Strategy and Partnerships), President’s Office, NTU
·
2024- ,
Executive Director, Singapore AI Safety Institute
·
2022- ,
Executive Director, Digital Trust Centre Singapore (DTC)
·
2020- ,
Consultant on Cyber and New Technologies, INTERPOL
·
2015- ,
Professor, College of Computing & Data Science, NTU
·
2019-2022 ,
Director, Nanyang Technopreneurship Center, NTU
·
2002-2010,
Professor, School of Software, Tsinghua University, China
·
1997-2002,
Associate Professor, National University of Singapore
·
1995-1997,
Senior Lecturer, National University of Singapore
·
1992-1995,
Lecturer, National University of Singapore
·
1990-1992,
Lecturer, Royal Holloway, University of London
·
1987-1990,
Ph.D., Computer Laboratory, University of Cambridge, U.K.
·
1984-1987,
B.Sc. in Computer Science (First Class Honours),
University of London, U.K.
· Nanyang Award for Innovation
& Entrepreneurship, Nanyang Technological University, 2023.
· Asia’s Most Influential
Scientist Award, Fortune Times, 2022.
· Singapore Cybersecurity Hall
of Fame Award, Association of Information Security Professionals, 2022.
· SPRING Singapore Merit
Award, SPRING Singapore, 2016
· Most Innovative Start-Up
Award, RSA Conference, 2015
· Singapore Foundation Award
(Research & Development), Japanese Chamber of Commerce and Industry, 1995
· Cambridge Hong Kong
Scholarship, Cambridge Commonwealth Trust, 1987-1990
· Overseas Research Student
Award, British Government, 1987-1990
·
Associate Editor, IEEE Transactions on Information Forensics and
Security, March 2024 -.
·
Associate Editor, IEEE Transactions on Dependable and Secure Computing,
December 2023 -.
·
Guest Editor, IEEE Transactions on Emerging Topics in Computational
Intelligence (Special Issue on “Digital Trust for Artificial Intelligence”),
2024-2025.
·
Coach (Future of Policing and Criminal Investigations), 2nd
INTERPOL Young Global Police Leaders Programme (YGPLP), Dubai, United Arab
Emirates, 13-17 March 2022.
·
Steering Committee Member, National Satellite of Excellence (NSoE) Steering Committee in Design Science & Technology
for Secure Critical Infrastructure (DeST-SCI),
Singapore University of Technology and Design, 1 July 2019 – 30 June 2022.
·
Independent Reviewer, Dutch Research Council (NWO), August 2019.
·
External Reviewer, Research Grants Council (RGC) of Hong Kong, February
2019.
·
Guest Editor, IEEE Wireless Communications (Special Issue on “Cognitive
and Intelligent Internet-of-Things for 5G-Enabled Smart City”), 2020-2021.
·
Guest Editor, IEEE Transactions on
Industrial Informatics (Special Issue on “Advances and Challenges in
Satellite-Based Industrial Internet-of-Things”), 2019-2020.
·
Chair, Cyber Security WG, SDE Technology Roadmap, Infocomm
and Media Development Authority, Singapore, 2018 – 2019
·
Technical Committee Member, SDE Technology Roadmap, Infocomm
and Media Development Authority, Singapore, 2018 – 2019
·
Reviewer for Journal, Nature
·
Reviewer for ACM Computing Surveys
·
Reviewer for IEEE Transactions on Communications
·
Reviewer for IEEE Systems Journal
·
Reviewer for IEEE Wireless Communications Magazine
·
Reviewer for IEEE Network Magazine
·
Reviewer for IEEE Computer Magazine
·
Reviewer for IEEE Internet of Things Journal
·
Reviewer for IEEE Access
·
Reviewer for IEEE Transactions on Circuits and Systems for Video
Technology
·
Reviewer for IEEE Transactions on Aerospace and Electronic Systems
·
Reviewer for IEEE Transactions on Cognitive Communications and
Networking
·
Reviewer for IEEE Journal of Emerging and Selected Topics in Power
Electronics
·
Reviewer for IEEE Transactions on Industrial Informatics
·
Reviewer for IEEE Transactions on Vehicular Technology
·
Reviewer for IEEE Transactions on Intelligent Transportation Systems
·
Reviewer for IET Radar, Sonar and Navigation
·
Reviewer for Journal of Parallel and Distributed Computing
·
Reviewer for Journal, Computers and Security
·
Reviewer for International Journal of Critical Infrastructure
Protection
·
External Examiner for Master of Data Science, The University of Hong
Kong, 2019-2020.
·
External Examiner for Bachelor of Computer Science (Cyber Security)
(Hons.) Programme, College of Computer Science and Information Technology, Universiti Tenaga Nasional (UNITEN, Malaysia, January 2018
– December 2019
·
External Reviewer, Singapore Ministry of Education (MOE) Innovation
Fund Evaluation Panel (IFEP), August 2017
·
Lead Principal Investigator, AI Safety & Governance Capabilities
& Capacity Building, Funded by Infocomm and Media
Development Authority ($10,000,000), March 2025 – February 2028.
·
Lead Principal Investigator, The Ant-NTU Joint Lab for
Privacy-Preserving Technologies and Digital Trust, Funded by Ant Group
($5,000,000), July 2024 – June 2029.
·
Lead Principal Investigator, The Mastercard-NTU Joint Lab for advanced
research in Cybersecurity and Digital Trust, Funded by Mastercard ($5,000,000),
February 2023 – January 2028.
·
Principal Investigator, Spectrum Optimization and Mobility Management
for LEO Satellite Internet-of-Things ($988,000), Funded by SUTD Future
Communications Research & Development Programme (FCP), November 2022 –
April 2025.
·
Lead Principal Investigator, National Centre for Research in Digital
Trust, funded by Infocomm and Media Development
Authority (S$50,000,000), October 2022 – September 2027.
·
Lead Principal Investigator, Strategic Centre for Research in
Privacy-Preserving Technologies & Systems, top-up funding by Infocomm and Media Development Authority (S$5,300,000),
April 2021 – March 2025.
· Lead Principal Investigator, TRANS Lab SPIRIT Phase 2,
Translational R&D for Application to Smart Nation & Digital Government
($12,000,000), April 2021-March 2025.
· Principal Investigator, Smart Nation
Internet-of-Things System Threat Analytics, funded by Cyber Security Agency of
Singapore, Ministry of Communications and Information ($4,467,400), March 2021
– March 2024.
·
Lead Principal Investigator, Strategic Centre for Research in
Privacy-Preserving Technologies & Systems, funded by Infocomm
and Media Development Authority (S$10,000,000), November 2018 – October 2023.
·
Principal Investigator, Smart Nation IoT Security Reference
Architecture Study, funded by Cyber Security Agency of Singapore, Ministry of
Communications and Information (S$780,000), May 2018 – December 2020.
·
Co-Lead Principal Investigator, Risk Assessment for Industrial Control
Systems, National Cybersecurity R&D (NCR) Grant Call 2016, funded by
National Research Foundation (S$1,211,520), October 2017 – September 2019.
·
Co-Lead Principal Investigator, Cybersecurity Protocol and Mechanism
for e-Logistics of Dangerous Goods Tracking Using Blockchain, National
Cybersecurity R&D (NCR) Grant Call 2016, funded by National Research
Foundation (S$989,280), September 2017 – August 2019.
·
Principal Investigator, ExPReSS: Extensible
Platform for Retrieval and Summarization Support, NTUITIVE GAP FUND GRANT
(S$250,000), July 2017 – March 2019.
·
Lead Principal Investigator, Smart Platform Infrastructure Research on
Integrative Technologies (SPIRIT), Translational R&D for Application to
Smart Nation, funded by National Research Foundation (S$11,000,000), September
2016 – March 2021.
Journal
1. F. Li, Y. Wang, K.Y. Lam, B.
Shen and L. Wang. “A Secure Dynamic Spectrum Access Scheme for
Internet-of-Things With Swarm Learning”, IEEE Internet of Things Journal, IEEE.
https://doi.org/10.1109/JIOT.2025.3583710.
2.
B.
Karunanayake, I. Khalil, X. Yi and K.Y. Lam. “Toward LLM-driven Adaptive
Policy Orchestration for Host-based Intrusion Detection Systems in IoT
Environments”, IEEE Network Magazine, IEEE. https://doi.org/10.1109/MNET.2025.3579532.
3.
B.
Shen, K.Y. Lam, F. Li and L. Wang. “Privacy-Aware Spectrum Pricing and
Power Control Optimization for LEO Satellite Internet-of-Things”, IEEE
Transactions on Wireless Communications, IEEE. https://doi.org/10.1109/TWC.2025.3574172.
4.
Y.
Hou, Y. Cao, H. Xiong, D. He, C.H. Chi and K.Y. Lam. “Heterogeneous
Parallel Key-Insulated Multi-Receiver Signcryption
Scheme for IoV”, IEEE Transactions on Information Forensics & Security,
IEEE. https://doi.org/10.1109/TIFS.2025.3567917.
5.
F.
Li, J. Yang, K.Y. Lam, B. Shen and H. Luo. “A dynamic spectrum access
scheme for Internet of Things with improved federated learning”, Journal of
Network and Computer Applications, Vol. 239, July 2025, 104189, Elsevier. https://doi.org/10.1016/j.jnca.2025.104189.
6.
C.
Shang, J. Cao, Z. Li, B. Niu, K.Y. Lam, C.H. Chi and H. Li. “A
Hierarchical Encrypted Compression Scheme for Intra-Vehicle Network”, IEEE
Transactions on Intelligent Transportation Systems, IEEE. https://doi.org/10.1109/TITS.2025.3558192.
7.
Z.
Liu, H. Ye, Y. Jiang, J. Shen, J. Guo, I. Tjuawinata and K.Y. Lam.
“Privacy-Preserving Federated Unlearning with Certified Client Removal”, IEEE
Transactions on Information Forensics & Security, IEEE, Vol. 20, pp.
3966-3978, 2025. https://doi.org/10.1109/TIFS.2025.3555868.
8.
H.
Ye, J. Guo, Z. Liu, Y. Jiang and K.Y. Lam. “Enhancing AI Safety of
Machine Unlearning for Ensembled Models”, Applied Soft Computing Journal,
Elsevier, Vol. 174, April 2025, 113011. https://doi.org/10.1016/j.asoc.2025.113011.
9.
Z.
Liu, H. Ye, C. Chen, Y. Zheng and K.Y. Lam. “Threats, Attacks, and Defenses in Machine Unlearning: A Survey”, IEEE Open
Journal of the Computer Society, IEEE. https://doi.org/10.1109/OJCS.2025.3543483.
10.
R.
Tu, X. Kang, C.W. Tan, C.H. Chi and K.Y. Lam. “All Points Guided
Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval”, IEEE
Transactions on Information Forensics & Security, IEEE, vol. 20, pp.
1695-1709. https://doi.org/10.1109/TIFS.2025.3534585.
11.
Y.
Jiang, J. Shen, Z. Liu, C.W. Tan and K.Y. Lam. “Towards Efficient and
Certified Recovery from Poisoning Attacks in Federated Learning”, IEEE
Transactions on Information Forensics & Security, IEEE. https://doi.org/10.1109/TIFS.2025.3533907.
12.
D.
Wang, Y. Cao, K.Y. Lam, C.H. Chi, and K.K.R. Choo. “An Accountable GAKA
Protocol With Changeable Thresholds and Verifiable Shares in UAVs-assisted IoVs for Emergency Rescue”, IEEE Transactions on
Intelligent Transportation Systems, IEEE, Vol. 26, Issue 4, pp. 5522-5537,
April 2025. https://doi.org/10.1109/TITS.2025.3531383.
13.
G.
Huang, M.B. Westover, E.K. Tan, H. Wang, D. Cui, W.Y. Ma, T. Wang, Q. He, H.
Wei, N. Wang, Q. Tian, K.Y. Lam, X. Yao and T.Y. Wong. “Artificial
Intelligence without Restriction Surpassing Human Intelligence with Probability
One: Theoretical Insight into Secrets of the Brain with AI Twins of the Brain”,
Neurocomputing, December 2024, 129053, Elsevier. https://doi.org/10.1016/j.neucom.2024.129053
14.
X. Gong, S. Li, Y. Chen, M. Li, R. Wei,
Q. Wang and K.Y. Lam. “Augmenting Model Extraction Attacks against Disruption-Based Defenses”, IEEE Transactions on Information Forensics &
Security, IEEE, Vol. 20, pp. 531-546. https://doi.org/10.1109/TIFS.2024.3515792.
15.
J.
Fan, Z. Liu, H. Du, J. Kang, D. Niyato and K.Y. Lam. “Improving Security
in IoT-Based Human Activity Recognition: A Correlation-Based Anomaly Detection Approach”,
IEEE Internet of Things Journal, Vol. 12, Issue 7, pp. 8301-8315, April 2025. https://doi.org/10.1109/JIOT.2024.3501361.
16.
C.
Shang, J. Cao, Y. Luo, B. Niu, L. Gan, K.Y. Lam and C.H. Chi. “A Vision
of 3GPP Wireless Sensing for Intelligent Vehicles: Scenarios, Architectures,
Security Challenges, Solutions, and Future Trends”, IEEE Network Magazine,
IEEE, Vol. 39, No. 2, pp. 80-90, March 2025. https://doi.org/10.1109/MNET.2024.3480973.
17.
Y.
He, F. Peng, R. Cai, Z. Yu, M. Long and K.Y. Lam. “Category-conditional
Gradient Alignment for Domain Adaptive Face Anti-spoofing”, IEEE Transactions
on Information Forensics & Security, IEEE. https://doi.org/10.1109/TIFS.2024.3486098.
18.
Z.
Liu, Y. Jiang, W. Jiang, J. Guo, J. Zhao and K.Y. Lam. “Guaranteeing
Data Privacy in Federated Unlearning with Dynamic User Participation”, IEEE
Transactions on Dependable and Secure Computing, IEEE. https://doi.org/10.1109/TDSC.2024.3476533.
19.
F. Li, W. Nie, K.Y. Lam and L.
Wang. “Network Traffic Prediction Based on
PSO-LightGBM-TM”, Computer Networks, Volume 254,
December 2024, Elsevier. https://doi.org/10.1016/j.comnet.2024.110810.
20.
R.
Liu, K.Y. Lam, W. Zhou, S. Wu, J. Zhao, D. Hu and M Gong. “STBA: Towards
Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario”, IEEE
Transactions on Multimedia, IEEE, Vol. 27, pp. 2666-2681, 2025. https://doi.org/10.1109/TMM.2025.3535328.
21.
Z.
Liu, Y. Jiang, J. Shen, M. Peng, K.Y. Lam, X. Yuan and X. Liu. “A Survey
on Federated Unlearning: Challenges, Methods, and Future Directions”, ACM
Computing Surveys, ACM. https://doi.org/10.1145/3679014.
22.
F.
Li, J. Yang, K.Y. Lam, B. Shen and G. Wei. “Dynamic Spectrum Access for
Mobile Internet-of-Things with Joint GNN and DQN”, Ad Hoc Networks, Elsevier,
Vol. 163, 1 October 2024, 103596. https://doi.org/10.1016/j.adhoc.2024.103596.
23.
P.
Si, R. Liu, L. Qian, J. Zhao and K.Y. Lam. “Post-Deployment Fine-Tunable Semantic Communication”, IEEE Transactions on
Wireless Communications, IEEE, vol. 24, no. 1, pp. 35-50, Jan. 2025. https://doi.org/10.1109/TWC.2024.3433479.
24.
L.
Wang, L. Che, K.Y. Lam, W. Liu and F. Li. “Mobile Traffic Prediction
with Attention-Based Hybrid Deep Learning”, Physical Communication, Elsevier,
June 2024. https://doi.org/10.1016/j.phycom.2024.102420.
25.
A.
Kalapaaking, I. Khalil, X. Yi, K.Y. Lam, G.B. Huang, N. Wang. “Auditable
and Verifiable Federated Learning Based on Blockchain-Enabled
Decentralization”, IEEE Transactions on Neural Networks and Learning Systems,
IEEE, vol. 36, no. 1, pp. 102-115, January 2025. https://doi.org/10.1109/TNNLS.2024.3407670.
26.
R.
Liu, W. Zhou, T. Zhang, K. Chen, J. Zhao and K.Y. Lam. “Boosting
Black-box Attack to Deep Neural Networks with Conditional Diffusion Models”,
IEEE Transactions on Information Forensics & Security, IEEE, vol. 19, pp.
5207-5219, May 2024. https://doi.org/10.1109/TIFS.2024.3390609.
27.
D.
Wang, Y. Cao, K.Y. Lam, Y. Hu, O. Kaiwartya.
“Authentication and Key Agreement Based on Three Factors and PUF for
UAVs-assisted Post-disaster Emergency Communication”, IEEE Internet of Things
Journal, IEEE, vol. 11, no. 11, pp. 20457-20472, June 2024. http://doi.org/10.1109/JIOT.2024.3371101.
28.
T.
Zhang, K.Y. Lam and J. Zhao. “Device Scheduling and Assignment in
Hierarchical Federated Learning for Internet of Things”, IEEE Internet of
Things Journal, IEEE, vol. 11, no. 10, pp. 18449-18462, May 2024. https://doi.org/10.1109/JIOT.2024.3362972.
29.
Z.
Liu, J. Guo, W. Yang, J. Fan, K.Y. Lam and J. Zhao. “Dynamic User
Clustering for Efficient and Privacy-Preserving Federated Learning”, IEEE
Transactions on Dependable and Secure Computing, IEEE. https://doi.org/10.1109/TDSC.2024.3355458.
30.
K.Y. Lam, X. Lu, L. Zhang, X. Wang, H. Wang and
S.Q. Goh. “Efficient FHE-based Privacy-Enhanced
Neural Network for Trustworthy AI-as-a-Service”, IEEE Transactions on
Dependable and Secure Computing, IEEE. https://doi.org/10.1109/TDSC.2024.3353536.
31.
M.
Yang, T. Guo, T. Zhu, I. Tjuawinata, J. Zhao and K.Y. Lam. “Local
differential privacy and its applications: A comprehensive survey”, Computer
Standards & Interfaces. Elsevier, Vol. 89, 2024, 103827. https://doi.org/10.1016/j.csi.2023.103827.
32.
L. Zhang, X. Wang, J. Wang, R. Pung, H.
Wang and K.Y. Lam. “An Efficient
FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMTs
Data Protection With Its Application to Pandemic Modelling”, IEEE Internet of
Things Journal, IEEE, vol. 11, no. 9, pp. 15272-15284, May 2024. https://doi.org/10.1109/JIOT.2023.3348122.
33.
H.
Ma, S. Huang, J. Guo, K.Y. Lam and T. Yang. “Blockchain-Based
Privacy-Preserving Federated Learning for Mobile Crowdsourcing”, IEEE Internet
of Things Journal, IEEE, vol. 11, no. 8, pp. 13884-13899, 15 April 2024. https://doi.org/10.1109/JIOT.2023.3340630.
34.
J.
Fan, M. Xu, J. Guo, L.K. Shar, J. Kang, D. Niyato and K.Y. Lam.
“Decentralized Multimedia Data Sharing in IoV: A Learning-based Equilibrium of
Supply and Demand”, IEEE Transactions on Vehicular Technology, IEEE, Vol. 73,
Issue 3, pp. 4035-4050, March 2024, DOI: 10.1109/TVT.2023.3322270.
35.
B.
Huang, D. Chaki, A. Bouguettaya and K.Y. Lam.
“A Survey on Conflict Detection in IoT-based Smart Homes”, ACM Computing
Surveys, ACM, Vol. 56, Issue 5, pp. 1-40, November 2023. https://doi.org/10.1145/3629517.
36.
H.
Yang, S. Zhang, A. Alphones, C. Chen, K.Y. Lam, Z. Xiong, L. Xiao and Y.
Zhang. “An Advanced Integrated Visible Light Communication and Localization
System”, IEEE Transactions on Communications, IEEE, DOI:
10.1109/TCOMM.2023.3309823.
37.
P.
Si, L. Qian, J. Zhao and K.Y. Lam. “A Hybrid Framework of Reinforcement
Learning and Convex Optimization for UAV-Based Autonomous Metaverse Data
Collection”, IEEE Network, vol. 37, no. 4, pp. 248-254, July/August 2023, https://doi.org/10.1109/MNET.011.2300032.
38.
K.L. Tan, C.H.
Chi and K.Y. Lam. “Survey on Digital Sovereignty and Identity: From
Digitization to Digitalization”, ACM Computing Surveys, ACM, Vol. 56, Issue 3,
pp. 1-36, October 2023. https://doi.org/10.1145/3616400.
39.
S. Zhang, K.Y.
Lam, B. Shen, L. Wang and F. Li. “Dynamic Spectrum Access for
Internet-of-Things with Hierarchical Federated Deep Reinforcement Learning”, Ad
Hoc Networks, Elsevier. DOI: https://doi.org/10.1016/j.adhoc.2023.103257.
40.
T. Zhang, K.Y.
Lam, J. Zhao and J. Feng. “Joint Device Scheduling and Bandwidth Allocation
for Federated Learning over Wireless Networks”, IEEE Transactions on Wireless
Communications, IEEE, vol. 24, no. 1, pp. 3-18, Jan. 2025. https://doi.org/10.1109/TWC.2023.3291701.
41.
F. Li, S. Zhang, K.Y. Lam, X. Liu and L. Wang. “Dynamic
Spectrum Optimization for Internet-of-Things with Social Distance Model”,
Wireless Network, Springer US, DOI: 10.1007/s11276-023-03358-w.
42.
T. Zhang, K.Y.
Lam and J. Zhao. “Deep reinforcement learning based scheduling strategy for
federated learning in sensor-cloud systems”, Future Generation Computer
Systems, 2023, Elsevier. https://doi.org/10.1016/j.future.2023.03.009.
43. J. Fan, W. Yang, Z. Liu, J. Kang, D. Niyato, K.Y. Lam, H. Du. “Understanding Security in Smart City Domains From the ANT-centric Perspective”, IEEE Internet of Things Journal, IEEE, Vol. 10, Issue 13, pp. 11199-11223, July 2023, DOI: 10.1109/JIOT.2023.3252040.
44.
Q. Li, X. Wang,
Q. Pei, X. Chen and K.Y. Lam. “Consistency preserving database
watermarking algorithm for decision trees”, Digital Communications and Networks
(2023), Elsevier. https://doi.org/10.1016/j.dcan.2022.12.015.
45.
M. Yang, I.
Tjuawinata, K.Y. Lam, T. Zhu, J. Zhao. “Differentially Private
Distributed Frequency Estimation”, IEEE Transactions on Dependable and Secure
Computing, IEEE, doi: 10.1109/TDSC.2022.3227654.
46.
T. Zhang, K.Y.
Lam, J. Zhao, F. Li, H. Han, N. Jamil. “Enhancing Federated Learning with
spectrum allocation optimization and device selection”, IEEE/ACM Transactions
on Networking, IEEE, DOI: 10.1109/TNET.2022.3231986.
47.
M. Yang, K.Y.
Lam, T. Zhu and C. Tang. “SPoFC: A framework for
stream data aggregation with local differential privacy”, Concurrency and
Computation: Practice and Experience, Wiley, https://doi.org/10.1002/cpe.7572.
48.
F. Li, L. Sun, K.Y.
Lam, S. Zhang, Z. Sun, B. Peng, H. Xu and L. Zhang. “Segmentation of Human
Aorta Using 3D nnU-Net-Oriented Deep Learning”,
Review of Scientific Instruments, AIP Publishing, DOI: 10.1063/5.0084433.
49. F. Li, Z. Sun, K.Y. Lam, S. Zhang, L. Sun and L. Wang. “Reputation-Based Power Allocation for NOMA Cognitive Radio Networks”, Wireless Network, Springer US, DOI: 10.1007/s11276-022-03139-x.
50.
K.L. Tan, C.H.
Chi and K.Y. Lam. “Secure and Privacy-Preserving Sharing of Personal
Health Records with Multi-Party Pre-Authorization Verification”, Wireless
Network, Springer US, 2022, DOI: 10.1007/s11276-022-03114-6.
51.
H. Yang, K.Y.
Lam, L. Xiao, Z. Xiong, H. Hu, D. Niyato and H.V. Poor. “Lead Federated
Neuromorphic Learning for Wireless Edge Artificial Intelligence”, Nature
Communications 13, 4269 (2022), DOI: 10.1038/s41467-022-32020-W (https://www.nature.com/articles/s41467-022-32020-w.pdf).
52. Z. Liu, J. Guo, W. Yang, J. Fan, K.Y. Lam and J. Zhao. “Privacy-Preserving Aggregation in Federated Learning: A Survey”, IEEE Transactions on Big Data, July 2022, IEEE, DOI: 10.1109/TBDATA.2022.3190835.
53.
Q. Li, X. Wang,
Q. Pei, K.Y. Lam, N. Zhang, M. Dong and V. Leung. “Database Watermarking
Algorithm based on Decision Tree Shift Correction”, IEEE Internet of Things
Journal, IEEE, Volume 9, Issue 23, pp. 24373-24387, December 2022, DOI: 10.1109/JIOT.2022.3188631.
54. Y. Sun, H. Xiong, S.M. Yiu and K.Y. Lam. “BitAnalysis: A Visualization System for Bitcoin Wallet Investigation”, IEEE Transactions on Big Data, vol. 9, no. 2, pp. 621-636, 1 April 2023, IEEE, DOI: 10.1109/TBDATA.2022.3188660.
55. M. Yang, I. Tjuawinata, K.Y. Lam. “K-means clustering with local dχ-privacy for privacy-preserving data analysis”, IEEE Transactions on Information Forensics & Security, IEEE, Vol. 17, pp. 2524-2537, 2022, DOI: 10.1109/TIFS.2022.3189532.
56.
Z. Li, R. Cao, H.
Li, K.Y. Lam, Y. Hu and A. Kot. “One-Class Knowledge Distillation for
Face Presentation Attack Detection", IEEE Transactions on Information
Forensics & Security, IEEE, Vol. 17, pp. 2137-2150, May 2022,
DOI:10.1109/TIFS.2022.3178240.
57. F. Li, B. Shen, J. Guo, K.Y.
Lam, G. Wei and L. Wang. “Dynamic Spectrum Access for Internet-of-Things Based on Federated Deep
Reinforcement Learning”, IEEE Transactions on Vehicular Technology, IEEE,
Volume 71, Issue 7, pp. 7952-7956, DOI: 10.1109/TVT.2022.3166535.
58. Z. Liu, J. Guo, K.Y. Lam and J. Zhao.
“Efficient Dropout-resilient Aggregation for Privacy-preserving Machine
Learning”, IEEE Transactions on Information Forensics & Security, IEEE,
Vol. 18, pp. 1839-1854, 2023, DOI: 10.1109/TIFS.2022.3163592.
59. H. Yang, J. Zhao, K.Y. Lam, Z. Xiong, Q. Wu and
L. Xiao. “Distributed Deep Reinforcement Learning Based Spectrum and Power
Allocation for Heterogeneous Networks”, IEEE Transactions on Wireless
Communications, IEEE, March 2022, DOI: 10.1109/TWC.2022.3153175.
60. Z. Li, H. Li, X. Luo, Y. Hu, K.Y. Lam and A.
Kot. “Asymmetric Modality Translation For Face Presentation Attack Detection”,
IEEE Transactions on Multimedia, IEEE, October 2021, DOI:
10.1109/TMM.2021.3121140.
61.
J. Li, Y. Li, C.
Cao and K.Y. Lam. “Conditional Anonymous Authentication with
Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles”, IEEE
Internet of Things Journal, IEEE, Volume 9, Issue 11, pp. 8749-8762, June 2022,
DOI: 10.1109/JIOT.2021.3116422.
62. F. Li, K.Y. Lam, Z. Ni, D. Niyato, X. Liu and L. Wang. “Cognitive Carrier Resource Optimization for Internet-of-Vehicles in 5G-Enhanced Smart Cities”, IEEE Network Magazine, vol. 36, no. 1, pp. 174-180, January/February 2022, IEEE, DOI: 10.1109/MNET.211.2100340.
63.
H. Han, J. Zhao,
W. Zhai, Z. Xiong, D. Niyato, M.Di Renzo, Q-V. Pham,
W. Lu and K.Y. Lam. “Reconfigurable Intelligent Surface Aided Power
Control for Physical-Layer Broadcasting”, IEEE Transactions on Communications,
IEEE, August 2021, DOI: 10.1109/TCOMM.2021.3104871.
64.
C. Huang, Y. Zhao, H. Chen, X. Wang, Q. Zhang, Y. Chen,
H.X. Wang and K.Y. Lam. “zkRep: A Privacy-preserving
Scheme for Reputation-based Blockchain System”, IEEE Internet of Things
Journal, IEEE, Volume 9, Issue 6, pp. 4330-4342, March 15 2022, DOI:
10.1109/JIOT.2021.3105273.
65. X. Liu, K.Y. Lam, F. Li, J. Zhao, L. Wang and T.S. Durrani. “Spectrum
Sharing for 6G Integrated Satellite-Terrestrial Communication Networks Based on
NOMA and CR”, IEEE Network Magazine, IEEE, Volume 35, Issue 4, pp. 28-34,
July/August 2021, DOI: 10.1109/MNET.011.2100021.
66.
H. Yang, J. Zhao, Z. Xiong, K.Y.
Lam, S. Sun and L. Xiao. “Privacy-Preserving Federated Learning for
UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management”,
IEEE Journal on Selected Areas in Communications, IEEE,
Volume 39, No. 10, pp. 3144-3159, Oct. 2021, DOI: 10.1109/JSAC.2021.3088655.
67.
K.Y. Lam, S. Mitra, F. Gondesen, X.
Yi. “ANT-Centric IoT Security Reference Architecture - Security-by-Design for
Satellite-Enabled Smart Cities”, IEEE Internet of Things Journal, IEEE, April
2021, DOI: 10.1109/JIOT.2021.3073734.
68.
F Li, K.Y. Lam, Z Sheng, W.
Lu, X. Liu and L. Wang. “Agent-Based Spectrum Management Scheme in Satellite
Communication Systems”, IEEE Transactions on Vehicular Technology, IEEE,
February 2021, DOI: 10.1109/TVT.2021.3059837.
69.
X. Li, L. Cheng, C. Sun, K.Y.
Lam, X. Wang and F. Li. “Federated Learning Empowered Collaborative Data
Sharing for Vehicular Edge Networks”, IEEE Network Magazine, IEEE, Volume 35,
Issue 3, pp. 116-124, May/June 2021, DOI: 10.1109/MNET.011.2000558.
70.
Y. Zhao, J. Zhao, J. Kang, Z. Zhang, D. Niyato, S. Shi and K.Y. Lam. “A Blockchain-Based Approach
for Saving and Tracking Differential-Privacy Cost”, IEEE Internet of Things
Journal, IEEE, February 2021, DOI: 10.1109/JIOT.2021.3058209.
71.
M. Yang, I. Tjuawinata, K.Y. Lam,
J. Zhao and L. Sun. “Secure Hot Path Crowdsourcing with Local Differential
Privacy under Fog Computing Architecture”, IEEE Transactions on Services
Computing, IEEE, November 2020, DOI:10.1109/TSC.2020.3039336.
72.
Y. Zhao, J. Zhao, M. Yang, T. Wang, N. Wang, L. Lyu, D. Niyato and K.Y. Lam. “Local Differential Privacy
based Federated Learning for Internet of Things”, IEEE Internet of Things
Journal, IEEE, November 2020, DOI:10.1109/JIOT.2020.3037194.
73.
T. Wang, J. Zhao, Z. Hu, X. Yang, X. Ren and K.Y. Lam. “Local Differential Privacy for Data Collection and
Analysis”, Neurocomputing, Elsevier, October 2020,
https://doi.org/10.1016/j.neucom.2020.09.073.
74.
M.B. Mollah, J. Zhao, D. Niyato, Y.L. Guan, C. Yuen, S. Sun, K.Y. Lam and L.H. Koh. “Blockchain for
the Internet of Vehicles towards Intelligent Transportation Systems: A Survey”,
IEEE Internet of Things Journal, IEEE, Volume 8, Issue 6, pp. 4157 – 4185,
March 2021, DOI: 10.1109/JIOT.2020.3028368.
75.
A. Chattopadhyay,
K.Y. Lam and Y. Tavva.
“Autonomous Vehicle: Security by Design”, IEEE Transactions on Intelligent
Transportation Systems, IEEE, Vol. 22, No. 11, pp. 7015-7029, November 2021,
DOI: 10.1109/TITS.2020.3000797.
76. L. Wang, K.Y. Lam, X. Liu and F. Li. “Resource Allocation in Satellite-Based Internet of
Things Using Pattern Search Method”, IEEE Access, IEEE, Volume 8, pp. 110908 –
110914, 2020, DOI: 10.1109/ACCESS.2020.3002834.
77. K.Y. Lam and C. Wilson. “Developing AI for Law Enforcement in
Singapore and Australia”, Communications of the ACM, ACM, 63(4), pp62, April
2020, DOI: 10.1145/3378418.
78. M. B. Mollah, J. Zhao, D. Niyato, K.Y. Lam, X. Zhang, A. Ghias, L.H. Koh, L. Yang. “Blockchain for
Future Smart Grid: A Comprehensive Survey”, IEEE Internet of Things Journal,
IEEE, DOI: 10.1109/JIOT.2020.2993601.
79.
H.Y. Ma, E. Huang and K.Y. Lam.
“Blockchain-based mechanism for fine-grained authorization in data
crowdsourcing”, Future Generation Computer Systems, Elsevier, 106 (2020), pp.
121–134, https://doi.org/10.1016/j.future.2019.12.037.
80.
F. Li, K.Y. Lam, X. Li, Z.
Sheng and L. Wang. “Advances and Emerging Challenges in Cognitive
Internet-of-Things”, IEEE Transactions on Industrial Informatics, IEEE,
November 2019, DOI: 10.1109/TII.2019.2953246.
81.
X. Wang, Z. Na, K.Y. Lam, X.
Liu, Z. Gao, F. Li and L. Wang. “Energy Efficiency Optimization for NOMA-Based
Cognitive Radio With Energy Harvesting”, IEEE Access, IEEE, doi: 10.1109/ACCESS.2019.2940698, Volume 7, pp. 139172 – 139180,
2019.
82.
F. Li, K.Y. Lam, L. Meng and
L. Wang. “Trading-Based Dynamic Spectrum Access and Allocation in Cognitive
Internet of Things”, IEEE Access, IEEE, Volume 7, pp. 125952 – 125959, doi: 10.1109/ACCESS.2019.2937582.
83.
F. Li, K.Y. Lam, H.W. Chen,
N. Zhao. “Spectral Efficiency Enhancement in Satellite Mobile Communications: A
Game-Theoretical Approach”, IEEE Wireless Communications, IEEE, doi: 10.1109/MWC.001.1900160,
15 October 2019.
84.
F. Li, K.Y. Lam, K. Zhao, M. Jia, X. Li and L.
Wang. “Spectrum Optimization for Satellite Communication Systems with
Heterogeneous User Preferences”, IEEE Systems Journal, IEEE, doi: 10.1109/JSYST.2019.2910230, 26 April 2019.
85.
X. Yi, E.
Bertino, F.Y. Rao, K.Y. Lam, S.
Nepal and A. Bouguettaya. “Privacy-Preserving User
Profile Matching in Social Networks”, IEEE Transactions on Knowledge and Data
Engineering, IEEE, doi: 10.1109/TKDE.2019.2912748, 23
April 2019.
86.
X. Yi, Z. Tari,
F. Hao, L.Q. Chen, J. Liu, K.Y. Lam,
X.C., Yang, I. Khalil, A. Zomaya, “Efficient Threshold Password-Authenticated
Secret Sharing Protocols for Cloud Computing”, Journal of Parallel and
Distributed Computing, Springer, https://doi.org/10.1016/j.jpdc.2019.01.013, 15 February 2019.
87.
S. Badsha, X. Yi, I. Khalil, S. Nepal, D. Liu and K.Y. Lam. “Privacy Preserving User
based Web Service Recommendations”, IEEE Access, IEEE, Volume 6, Issue 1,
December, 2018, DOI 10.1109/ACCESS.2018.2871447.
88.
L. Wang, K.Y. Lam, M. Xiong, F. Li, X. Liu and
J. Wang. “Spectrum Pricing for Cognitive Radio Networks with User's Stochastic
Distribution”, Wireless Networks, Springer US, 16 July 2018, https://doi.org/10.1007/s11276-018-1799-8.
89.
F. Li, K.Y. Lam, J.Y. Hua, K Zhao, N. Zhao and
L. Wang. “Improving Spectrum Management for Satellite Communication Systems
with Hunger Marketing”, IEEE Wireless Communications Letters, IEEE, 17 January
2019, Doi: 10.1109/LWC.2019.2893659.
90.
F. Li, K.Y. Lam, Z. Sheng, X. Zhang, K. Zhao
and L. Wang. “Q-Learning-Based Dynamic Spectrum Access in Cognitive Industrial
Internet of Things”, Wireless Networks and Applications, Springer US, 11
September 2018, DOI 10.1007/s11036-018-1109-9.
91.
L. Wang, K.Y. Lam, M. Xiong, F. Li, X. Liu and
J. Wang. “Spectrum Pricing for Cognitive Radio Networks with User's Stochastic
Distribution”, Wireless Networks, Springer US, 16 July 2018, https://doi.org/10.1007/s11276-018-1799-8.
92.
F. Li, K.Y. Lam, N. Zhao, X. Liu, K. Zhao, and
L. Wang. “Spectrum Trading for Satellite Communication Systems with Dynamic
Bargaining,” IEEE Transactions on Communications, IEEE, Volume 66, Issue 10,
pp. 4680 – 4693, Oct 2018, Doi: 10.1109/TCOMM.2018.2837909.
93.
S. Badsha, X. Yi, I. Khalil, D. Liu, S. Nepal, E. Bertino and K.Y. Lam. “Privacy Preserving
Location-Aware Personalized Web Service Recommendations”, IEEE Transactions on
Services Computing, 22 May 2018, Doi: 10.1109/TSC.2018.2839587.
94.
F. Li, K.Y. Lam,
X. Li, X. Liu, L. Wang and C.M. Leung. “Dynamic
Spectrum Access Networks with Heterogeneous Users: How to Price the Spectrum?”,
IEEE Transactions on Vehicular Technology, IEEE, Volume 67, Issue 6, pp 5203 –
5216, June 2018, Doi: 10.1109/TVT.2018.2818749.
95.
F. Li, K.Y. Lam, L. Wang, Z. Na, X. Liu and Q.
Pan. “Caching Efficiency Enhancement at Wireless Edges with Concerns on User's
Quality of Experience”, Wireless Communications and Mobile Computing, Vol.
2018, Article ID 1680641, 10 pages, 2018. Doi:10.1155/2018/1680641.
96.
F. Li, K.Y. Lam and L. Wang. “Power allocation
in cognitive radio networks over Rayleigh-fading channels with hybrid
intelligent algorithms”, Wireless Networks, Volume 24, Issue 7, pp. 2397 –
2407, Oct 2018. Doi:10.1007/s11276-017-1476-3.
97.
F. Li, X. Liu, K.Y. Lam, Z. Na, J. Hua, J. Wang and L.
Wang. “Spectrum Allocation with Asymmetric Monopoly Model for Multibeam-Based
Cognitive Satellite Networks”, IEEE Access, IEEE, Volume 6, Issue 1, pp. 9713 –
9722, 2018. Doi: 10.1109/ACCESS.2018.2797278.
98.
A. Burg and A.
Chattopadhyay and K.Y. Lam.
“Wireless Communication and Security Issues for Cyber-Physical Systems and the
Internet-of-Things”, Proceedings of the IEEE, IEEE, Volume: 106, Issue: 1,
pp. 38 – 60, Jan. 2018. Doi: 10.1109/JPROC.2017.2780172.
99.
L. Wang, F. Li,
X. Liu, K.Y. Lam, Z. Na and H. Peng.
“Spectrum Optimization for Cognitive Satellite Communications with Cournot Game
Model”, IEEE Access, IEEE, Volume 6, Issue 1, pp. 1624 – 1634, 2018. Doi: 10.1109/ACCESS.2017.2779804.
100.
F. Li, K.Y. Lam, J. Wang, X. Liu, K. Zhao and
L. Wang. “Joint Pricing and Power Allocation for Multibeam Satellite Systems
with Dynamic Game Model”, IEEE Transactions on Vehicular Technology, IEEE,
Volume 67, Issue 3, pp. 2398 – 2408, March 2018. Doi: 10.1109/TVT.2017.2771770.
101.
P. Vikramkumar, A. Chattopadhyay and K.Y. Lam. “Secure and Lightweight Compressive Sensing using Stream
Cipher”, IEEE Transactions on Circuits and Systems II, IEEE, Volume 65, Issue
3, pp. 371-375, March 2018. Doi: 10.1109/TCSII.2017.2715659.
Conference
1. C.Y. Kwok, J.Q. Yip, Z. Qiu, C.H. Chi
and K.Y. Lam. “Bona fide Cross Testing Reveals Weak Spot in Audio
Deepfake Detection Systems”, The 26th Edition of the Interspeech Conference, August 17-21, 2025, Rotterdam, The
Netherlands. Accepted.
2. Y. Zheng, Z. Xie, G. Wang, Z. Liu, L.
Lin and K.Y. Lam. “Why Multi-Interest Fairness Matters: Hypergraph
Contrastive Multi-Interest Learning for Fair Conversational Recommender
System”. The 63rd Annual Meeting of the Association for
Computational Linguistics (ACL 2025), July 27 – 1 August 2025, Vienna, Austria.
Accepted.
3. Y. Zheng, M. Qian, G. Wang, Y. Liu,
Z. Chen, M. Mao, L. Lin and K.Y. Lam. “HyperCRS:
Hypergraph-Aware Multi-Grained Preference Learning to Burst Filter Bubbles in
Conversational Recommendation System”, The 63rd Annual Meeting of
the Association for Computational Linguistics (ACL 2025), July 27 – 1 August
2025, Vienna, Austria. Accepted.
4. H. Zhang, P. Ding, Y. Wang, G. Liu,
H. Wang and K.Y. Lam. “Towards Comprehensive and Prerequisite-Free
Explainer for Graph Neural Networks”, Special Track on AI4Tech: AI Enabling
Critical Technologies. The 34th International Joint Conference on
Artificial Intelligence (IJCAI-25), 16-22 August 2025, Montreal, Canada.
Accepted.
5. Z. Lu, Q. Tang, T. Zhang, A. Feketa and K.Y. Lam. Asynchronous Dynamic Committee
Proactive Secret Sharing for Large Data, The 45th IEEE International
Conference on Distributed Computing Systems (ICDCS 2025), 20 – 23 July,
Glasgow, Scotland, U.K. Accepted.
6. X. Gong, M. Li, Y. Zhang, F. Ran, C.
Chen, Y. Chen, Q. Wang and K.Y. Lam. “PAPILLON: Efficient and Stealthy
Fuzz Testing-Powered Jailbreaks for LLMs”, The 34th USENIX Security Symposium,
August 13–15, 2025, Seattle, WA, USA. https://www.usenix.org/conference/usenixsecurity25/presentation/gong-xueluan.
7. X. Yang,
Y. Wang, X. Zhang, S. Wang, H. Wang and K.Y. Lam. “A Macro- and Micro-Hierarchical
Transfer Learning Framework for Cross-Domain Fake News Detection”, The Web
Conference 2025 (WWW25) - The Web4Good Track, 28 April – 2 May 2025, Sydney
Australia, pp. 5297 - 5307. https://doi.org/10.1145/3696410.3714517.
8.
Y. Wang, B. Shen,
F. Li and K.Y. Lam. “Swarm Dynamic Spectrum Access for
Internet-Of-Things”, 2025 IEEE Wireless Communications and Networking
Conference (WCNC 2025), 24-27 March 2025, Milan, Italy, 2025, pp. 1-6. https://doi.org/10.1109/WCNC61545.2025.10978419.
9.
F. Li, S. Shen, K.Y.
Lam, B. Shen and L. Wang. “Secure Dynamic Spectrum Access in
Internet-of-Things Based on Machine Unlearning”, The 7th
International Conference on Artificial Intelligence in Information and
Communication (ICAIIC 2025), 18-21 February 2025, Fukuoka, Japan. Accepted.
10.
F. Li, X. Chen, K.Y.
Lam, B. Shen and L. Wang. “Federated-Learning-Based Wireless Traffic
Prediction”, The 7th International Conference on Artificial Intelligence
in Information and Communication (ICAIIC 2025), 18-21 February 2025, Fukuoka,
Japan. Accepted.
11.
Y. Jiang, X.
Tong, Z. Liu, H. Ye, C.W. Tan and K.Y. Lam. “Efficient Federated
Unlearning with Adaptive Differential Privacy Preservation”, The 2024 IEEE
International Conference on Big Data (IEEE BigData
2024): Special Session on Federated Learning on Big Data, December 15-18, 2024,
Washington DC, USA, pp. 7822-7831. https://doi.org/10.1109/BigData62323.2024.10825236.
12.
B. Shen, K.Y.
Lam, W. Yang, Z. Liu and F. Li. “LEO Satellite-Enabled Networks: A
Privacy-Preserving Framework for Spectrum Pricing and Power Control
Optimization”, MSN Track 3: Security, Privacy, Trust, and Blockchain, The 20th
International Conference on Mobility, Sensing and Networking (MSN 2024),
December 20-22, 2024, Harbin, China. Accepted.
13.
Y. Zheng, R. Xu,
G. Wang, L. Lin and K.Y. Lam. “Mitigating Matthew Effect:
Multi-Hypergraph Boosted Multi-Interest Self-Supervised Learning for
Conversational Recommendation”, The 2024 Conference on Empirical Methods in
Natural Language Processing (EMNLP 2024), pp. 1455-1466, November 2024. https://aclanthology.org/2024.emnlp-main.86.
14.
B. Huang and K.Y.
Lam. “A Survey on Physical Event Verification in User-centric Smart Home
Systems”, The 1st International Workshop on Human Factors for Software
Dependability co-located with the 35th IEEE International Symposium
on Software Reliability Engineering (ISSRE 2024), 28-31 Oct, Tsukuba, Japan.
2024, pp. 263-270, IEEE. https://doi.org/10.1109/ISSREW63542.2024.00089.
15.
B. Shen, S.Q.
Goh, K.Y. Lam and F. Li. “Efficient and Secure Federated Dynamic
Spectrum Access for LEO Satellite Internet-of-Things”, 2024 IEEE 24th
International Conference on Communication Technology, October 18-20, 2024,
Chengdu, China, 2004, pp. 366-371. https://doi.org/10.1109/ICCT62411.2024.10946453.
16.
H. Ye, Z. Liu, Y.
Jiang, J. Guo and K.Y. Lam. “Malicious Unlearning in Ensemble Models”,
The 21st Annual International Conference on Privacy, Security &
Trust (PST2024), 28-30 August 2024, Sydney, Australia, 2024, pp. 1-6. https://doi.org/10.1109/PST62714.2024.10788066.
17.
J. Cao, C. Shang,
Z. Li, Y. Luo, K.Y. Lam, C.H. Chi and H. Li. “A Message-based
Lightweight Session Key Distribution Scheme for Intra-Vehicle Network”, 2024
IEEE Global Communications Conference: Communication & Information Systems
Security, December 8-12, 2024, Cape Town, South Africa. Accepted.
18.
Y. Jiang, C.W.
Tan and K.Y. Lam. “Accelerating Federated Unlearning via Polyak Heavy
Ball Method”, 2024 IEEE Information Theory Workshop (ITW), November 24-28,
2024, Shenzhen, China, pp. 235-240. https://doi.org/10.1109/ITW61385.2024.10807033.
19.
X. Yang, Y. Wang, X. Zhang, S. Wang, H. Wang and K.Y.
Lam. “UPDATE: Mining User-News
Engagement Patterns for Dual-Target Cross-Domain Fake News Detection”, Special
Session on Private, Secure, and Trust Data Analytics (PSTDA2024) of The 11th
IEEE International Conference on Data Science and Advanced Analytics (DSAA
2024), October 6-10, 2024, San Diego, CA, United States. Accepted. (Winner of Best
Paper Award). https://doi.org/10.1109/DSAA61799.2024.10722833.
20. Q. Zheng, Y. Yu, S. Yang, J. Liu, K.Y.
Lam and A. Kot. “Towards Physical World Backdoor Attacks against Skeleton
Action Recognition”, The 18th European Conference on Computer Vision
(ECCV 2024), Sept 29 – Oct 4, 2024, Milano, Italy. LNCS, vol. 15106, pp.
215-233. Springer, Cham. https://doi.org/10.1007/978-3-031-73195-2_13.
21.
Y. Yu, Q. Zheng,
S. Yang, W. Yang, J. Liu, S. Lu, Y.P. Tan, K.Y. Lam and A. Kot.
“Unlearnable Examples Detection via Iterative Filtering”, The 33rd
International Conference on Artificial Neural Networks (ICANN 2024), September
17–20, 2024, Lugano, Switzerland. LNCS, vol 15025. Springer, Cham. https://doi.org/10.1007/978-3-031-72359-9_18.
22.
P. Si, R. Liu, L.
Qian, J. Zhao and K.Y. Lam. “Fine-Tunable
Semantic Communication for Image Transmission”, The 10th
International Conference on Big Data Computing and Communications (BigCom2024),
9-11 August, 2024, Dalian, Liaoning, P.R. China. Accepted. (Winner of Best Student
Paper Award).
23.
B. Huang, C.
Chen, K.Y. Lam and F. Huang. “Proactive Detection of Physical Inter-rule
Vulnerabilities in IoT Services Using a Deep Learning Approach”, Workshop on
Internet of Intelligent Service Systems (IISS) in the 2024 IEEE World Congress
on Web Services (ICWS), July 7-13, 2024, Shenzhen, China. Accepted.
24.
T. Guo, S. Peng,
Z. Zhang, M. Yang and K.Y. Lam. “Improving the accuracy of locally
differentially private community detection by order-consistent data
perturbation”, In Proceedings of the 47th International ACM SIGIR
Conference on Research and Development in Information Retrieval (SIGIR’24),
July 2024, pp. 1743-1752. https://dl.acm.org/doi/10.1145/3626772.3657836.
25.
J. Wang, Z. Liu, J. Nie, Y. Qi, C.H. Chi, K.Y. Lam.
“Object-level Copy-Move Forgery Image
Detection based on Inconsistency Mining”, Proceedings of the ACM on Web
Conference 2024, May 2024, pp. 943–946. https://doi.org/10.1145/3589335.3651540.
26.
F. Li, W. Nie, K.Y.
Lam, B. Shen and X. Li. “Network Traffic Prediction Using PSO-LightGBM-TM”, IEILM 2024: IEEE INFOCOM 2024 Workshop on
Integrating Edge Intelligence and Large Model in Next Generation Networks, May
20, 2024, Vancouver, Canada. Accepted.
27.
J. Shen, W. Yang,
Z. Chu, J, Fan, D. Niyato and K.Y. Lam. “Effective Intrusion Detection
in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge
Distillation-based Federated Learning”, 2024 IEEE International Conference on
Communications (ICC): Communication and Information System Security Symposium,
9-13 June 2024, Denver, CO, USA, 2024, pp. 2034-2039. https://doi.org/10.1109/ICC51166.2024.10622262.
28.
R. Liu, W. Zhou,
S. Wu, J. Zhao and K.Y. Lam. “SSTA: Salient Spatially Transformed
Attack”, The 2024 IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP 2024), 14-10 April 2024, Seoul, Korea, pp. 5910-5914, https://doi.org/10.1109/ICASSP48485.2024.10447882.
29.
Y. He, F. Peng,
M. Long and K.Y. Lam. “Causality-Inspired Single-Source Domain
Generalization for Face Anti-Spoofing”, The 2024 IEEE International Conference
on Acoustics, Speech and Signal Processing (ICASSP 2024), 14-10 April 2024,
Seoul, Korea, pp. 4925-4929, https://doi.org/10.1109/ICASSP48485.2024.10447694.
30.
S. Li, M. Ge, R.
Feng, X. Li, and K.Y. Lam. “Automatic Detection and Analysis towards
Malicious Behavior in IoT Malware”, Machine Learning
for Cybersecurity Workshop (MLC), The 23rd IEEE International
Conference on Data Mining (ICDM'23), 1-4 December, Shanghai, China, 2023, pp.
1332-1341, IEEE. https://doi.org/10.1109/ICDMW60847.2023.00171.
31.
V. Sachidananda,
B. Chai, F. Gondesen, K.Y. Lam and Yang Liu. “Honey-Gauge: Enabling
User-Centric Honeypot Classification”, The 3rd International
Conference on Ubiquitous Security 2023 (UbiSec-2023), 1-3 November 2023,
Exeter, UK, Communications in Computer and Information Science, Vol 2034.
Springer, Singapore. https://doi.org/10.1007/978-981-97-1274-8_8.
32.
V. Sachidananda,
S. Muneeswaran, Y. Liu and K.Y. Lam. “Do NoT
Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious
Email Attachments”, in 2023 IEEE 22nd IEEE International Conference
on Trust, Security and Privacy in Computing and Communications (TrustCom-2023),
1-3 Nov 2023, Exeter, United Kingdom, 2023, pp. 412-421. https://doi.org/10.1109/TrustCom60117.2023.00072.
33.
V. Sachidananda,
B. Teo, R. Feng, K.Y. Lam and L. Yang, “FOCUS: Fatigue-Reducing IOCs
Through Prioritization and Scoring,” 2023 IEEE Intl Conf on Dependable,
Autonomic and Secure Computing (DASC/PiCom/CBDCom/CyberSciTech), Abu Dhabi,
United Arab Emirates, 2023, pp. 0020-0027, https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361355.
34.
V. Sachidananda,
A. Sachdeva, R. Patil, K.Y. Lam and Y. Liu. “APTer:
Towards the Investigation of APT Attribution”, The 2023 6th IEEE
Conference on Dependable and Secure Computing (IEEE DCS 2023), November 7-9,
2023, Tampa, FL, USA, 2023, pp. 1-10, https://doi.org/10.1109/DSC61021.2023.10354155.
35.
J. Fan, M. Xu, Z.
Liu, H. Ye, C. Gu, D. Niyato and K.Y. Lam. “A Learning-based Incentive
Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles”, The
2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), 10-13
October 2023, Hong Kong. https://doi.org/10.1109/VTC2023-Fall60731.2023.10333689.
36.
G. Zeng, J. Lai, Z. Huang, L. Zhang, X. Wang, K.Y. Lam,
H. Wang and J. Weng. “Non-Interactive
Zero-Knowledge Functional Proofs”, 2023 International Conference on the Theory
and Application of Cryptology and Information Security (Asiacrypt
2023), December 4-8, 2023, Guangzhou, China. LLNCS 14442, pp. 236–268,
Springer. https://doi.org/10.1007/978-981-99-8733-7_8.
37.
P. Si, J. Zhao, K.Y.
Lam and Q. Yang. “UAV-assisted Semantic Communication with Hybrid Action Reinforcement
Learning”, The 2023 IEEE Global Communications Conference: : Next-Generation
Networking and Internet (GLOBECOM 2022), December 4 – 8, 2023, Kuala Lumpur,
Malaysia, pp 3801-3806, https://doi.org/10.1109/GLOBECOM54140.2023.10437643.
38.
R. Liu, J. Zhang,
K.Y. Lam, J. Zhao and W. Zhou. “SCME: A Self-Contrastive Method for
Data-free and Query-Limited Model Extraction Attack”, The 2023 International
Conference on Neural Information Processing (ICONIP2023), November 20-23, 2023,
Changsha, China, LNCS 14451, pp 370-382, Springer. https://doi.org/10.1007/978-981-99-8073-4_29.
39.
N. Lee, U.
Vasanthakumar, R. Chen, C. Lee, K.Y. Lam, S.C. Hui, R. Kow, B. Er, F.M. Tarmidzi and
K.T. Aung. “Predictive Food Safety Risk Monitoring”, The 10th
International Conference on ICT for Smart Society 2023 (ICISS 2023), September
6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291540.
40.
U. Vasanthakumar,
J.R.B. Goh, S.C. Hui, K.Y. Lam, B. Er, F.M. Tarmidzi
and K.T. Aung. “Fine-tuning Pre-trained Language Model for Urgency
Classification on Food Safety Feedback”, The 10th International
Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023,
Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291215.
41.
I. Tjuawinata, Y.
Zhao, B. Shen, K.Y. Lam and C.H. Chi. “Search and Permission Request
over Encrypted Database”, The 10th International Conference on ICT
for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291415.
42.
A. Gunawan, I.
Tjuawinata, K.Y. Lam, C.H. Chi. “Decentralized Data Sharing using
Searchable Encryption Database with Selective Data Retrieval”, The 10th
International Conference on ICT for Smart Society 2023 (ICISS 2023), September
6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291467.
43.
T. Zhang, K.Y.
Lam and J. Zhao. “Device Scheduling and Bandwidth Allocation for Federated
Learning over Wireless Networks”, The 10th International Conference
on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung,
Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291589.
44.
V. Sachidananda,
R. Patil, H. Peng, Y. Liu and K.Y. Lam. “ThreatLand:
Extracting Intelligence from Audit Logs via NLP methods”, The 20th
International Conference on Privacy, Security, and Trust (PST 2023), 21-23
August 2023, Copenhagen, Denmark. https://doi.org/10.1109/PST58708.2023.10320173.
45.
C. Chen, Y. Wang,
Y. Zhang, Q.Z. Sheng and K.Y. Lam. “Separate-and-Aggregate: A
Transformer-based Patch Refinement Model for Knowledge Graph Completion”, The
19th International Conference on Advanced Data Mining and
Applications (ADMA'23), Shenyang, China, 21-23 August, 2023, Lecture Notes in
Computer Science, vol 14177. Springer, Cham. https://doi.org/10.1007/978-3-031-46664-9_5.
46. K.Y. Lam, V.
Cheng and Z.K. Yeong. “Applying Large Language Models for Enhancing Contract
Drafting”, 3rd International Workshop on Artificial Intelligence and
Intelligent Assistance for Legal Professionals in the Digital Workplace (LegalAIIA 2023),
19 June 2023, Braga, Portugal, Vol. 3423, pp. 70-80, CEUR Workshop Proceedings.
https://ceur-ws.org/Vol-3423/.
47. C. Chen, Y. Wang, A. Sun, B. Li and K.Y. Lam.
“Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge Graph
Completion via Conditional Soft Prompting”, The 61st Annual Meeting
of the Association for Computational Linguistics (ACL 2023) , July 9-14, 2023,
Toronto, Canada, pp 11489–11503. https://doi.org/10.18653/v1/2023.findings-acl.729.
48. A. Luqman, A. Chattopadhyay and K.Y. Lam.
“Membership Inference Vulnerabilities in Peer to Peer Federated Learning”, The
Inaugural AsiaCCS Workshop on Secure and Trustworthy
Deep Learning Systems (SecTL 2023), 10 July 2023,
Melbourne, Australia, ACM. https://doi.org/10.1145/3591197.3593638.
49. Z. Liu, J. Guo, M. Yang, W. Yang, J. Fan and K.Y.
Lam. “Privacy-Enhanced Knowledge Transfer with Collaborative Split Learning
over Teacher Ensembles”, The Inaugural AsiaCCS
Workshop on Secure and Trustworthy Deep Learning Systems (SecTL
2023), 10 July 2023, Melbourne, Australia, ACM. https://doi.org/10.1145/3591197.3591303.
(Winner of Best Paper
Award)
50. W. Yang, Z. Chu, J. Fan, Z. Liu and K.Y. Lam.
“A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT
Security”, 9th ACM Cyber-Physical System Security Workshop (CPSS
2023), 10 July 2023, Melbourne, Australia, ACM. https://doi.org/10.1145/3592538.3594270.
51. J. Fan, L.K. Shar, J. Guo, W. Yang, D. Niyato, K.Y.
Lam. “Differentiated Security Architecture for Secure and Efficient
Infotainment Data Communication in IoV Networks”, 16th International
Conference on Network and System Security (NSS) 2022, December 9-12, 2022,
Denarau Island, Fiji, , LNCS 13787, pp 283-304, Springer. https://doi.org/10.1007/978-3-031-23020-2.
52. Q. Han, J. Zhao and K.Y. Lam. “Facial Landmark
Predictions with Applications to Metaverse”, 2022 IEEE 8th World Forum on
Internet of Things (WF-IOT 2022), October 26 – November 11, 2022, Yokohama,
Japan, pp. 1-6, https://doi.org/10.1109/WF-IoT54382.2022.10152230.
53. B. Huang, B. Zhang and Q.Z. Sheng and K.Y. Lam.
“A Multi-task Learning Approach for Predicting Intentions Using Smart Home IoT
Services”, The 20th International Conference on Service Oriented
Computing (ICSOC), November 29 – 2 December 2022, Sevilla, Spain. In: Troya,
J., Medjahed, B., Piattini, M., Yao, L., Fernández,
P., Ruiz-Cortés, A. (eds) Service-Oriented Computing. ICSOC 2022. Lecture Notes
in Computer Science, vol 13740. Springer, Cham. https://doi.org/10.1007/978-3-031-20984-0_29.
54. C. Chen, Y. Wang, B. Li and K.Y. Lam.
“Knowledge Is Flat: A Seq2Seq Generative Framework for Various Knowledge Graph
Completion”, The 29th International Conference on Computational
Linguistics (COLING 2022), October 12-17, 2022, Gyeongju, Republic of Korea. pp
4005-4017. https://aclanthology.org/2022.coling-1.352.
55. P. Si, J. Zhao, H. Han, K.Y. Lam and L. Yang.
“Resource Allocation and Resolution Control in the Metaverse with Mobile
Augmented Reality”, The 2022 IEEE Global Communications Conference (GLOBECOM
2022), December 4 – 8, 2022, Rio de Janeiro, Brazil, pp. 3265-3271. https://doi.org/10.1109/GLOBECOM48099.2022.10001548.
56. T. Zhang, Z. Li, Y. Chen, K.Y. Lam and J. Zhao.
“Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and
Supervised Learning”, The 15th IEEE International Conference on
Internet of Things (iThings-2022), August 22-25, 2022, Espoo, Finland, pp.
77-84. DOI:
10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00050.
57. H. Yang, K.Y. Lam, J. Nie, J. Zhao, S. Garg, L.
Xiao, Z. Xiong and M. Guizani. “3D Beamforming Based
on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks”,
The Fifth IEEE Workshop on 5G and Beyond Wireless Security (5th
Wireless-Sec 2021) held in Conjunction with the 2021 IEEE Global Communications
Conference (GLOBECOM 2021), 2021, pp. 1-6, DOI:
10.1109/GCWkshps52748.2021.9681960. (Winner
of Best Paper Award).
58. J. Guo, Z. Liu, K.Y. Lam, J. Zhao and Y. Chen.
“Privacy-Enhanced Federated Learning with Weighted Aggregation”, The 7th
International Symposium on Security and Privacy in Social Networks and Big Data
(SocialSec 2021), November 19-21, 2021, Fuzhou, China. https://doi.org/10.1007/978-981-16-7913-1_7.
59. H. Yang, J. Zhao, K.Y. Lam, S. Garg, Q. Wu and Z. Xiong. “Deep Reinforcement Learning Based Resource Allocation for Heterogeneous Networks”, The 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2021), 2021, pp. 253-258, DOI: 10.1109/WiMob52687.2021.9606402.
60.
W.Z. Yang and K.Y. Lam. “Effective Anomaly Detection Model
Training with Only Unlabeled Data by Weakly
Supervised Learning Techniques”, The 23rd International Conference
on Information and Communications Security (ICICS 2021), September 17-19, 2021,
Chongqing, P.R. China, LNCS, Vol 12918. Springer, Cham. https://doi.org/10.1007/978-3-030-86890-1_23.
61.
H. Yang, J. Zhao, J. Nie, N. Kumar, K.Y. Lam and Z. Xiong,
"UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation
Based on Asynchronous Reinforcement Learning," IEEE INFOCOM 2021 -
IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2021,
pp. 1-6, doi:
10.1109/INFOCOMWKSHPS51825.2021.9484604.
62. Y. Zhao, J. Zhao, W. Zhai, S. Sun, D. Niyato, K.Y. Lam. “A Survey of 6G Wireless Communications: Emerging Technologies”, Future of Information and Communications Conference (FICC) 2021, April 29-30, 2021, Vancouver, Canada. https://doi.org/10.1007/978-3-030-73100-7_12.
63. H. Yang, Y. Zhao, Z. Xiong, J. Zhao, D. Niyato, K.Y. Lam, Q. Wu. “Deep Reinforcement Learning Based Intelligent Reflecting Surface for Secure Wireless Communications”, GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020, pp. 1-6, doi: 10.1109/GLOBECOM42002.2020.9322615.
64.
Y. Huang, F. Wang, A.W.K. Kong and K.Y.
Lam. “New Threats against Object Detector with Non-Local Block”, The 16th
European Conference on Computer Vision (ECCV 2020), 23-28 August 2020, Springer
LNCS 12365. https://doi.org/10.1007/978-3-030-58565-5_29.
65.
F. Gondesen, S. Mitra and K.Y.
Lam. “Feasibility of PUF based Authentication on ATtiny
devices with off-the-shelf SRAM”, The 6th ACM Cyber-Physical System
Security Workshop (CPSS 2020), 6 October 2020, Taipei, Taiwan. pp 2-10, https://doi.org/10.1145/3384941.3409591.
66. F. Li and K.Y.
Lam. “Resource Optimization in Satellite-Based Internet of Things”, The 2nd
International Conference on Artificial Intelligence in Information and
Communication (ICAIIC 2020), February 19-21, 2020, Fukuoka, Japan. IEEE,
DOI: 10.1109/ICAIIC48513.2020.9065200.
67. W.Z. Yang and K.Y.
Lam. “Automated Cyber Threat Intelligence Reports Classification for Early
Warning of Cyber Attacks in Next Generation SOC”, The 21st International
Conference on Information and Communications Security (ICICS 2019), December
15-17, 2019, Beijing, P.R. China. (Winner
of Best Student Paper Award). https://doi.org/10.1007/978-3-030-41579-2_9.
68. T. Wang, X.
Yang, X. Ren, J. Zhao and K.Y. Lam.
“Adaptive Differentially Private Data Stream Publishing in Spatio-temporal
Monitoring of IoT”, The 38th International Performance Computing and
Communications Conference (IPCCC 2019), 29-31 Oct 2019, London, UK.
DOI: 10.1109/IPCCC47392.2019.8958751.
69. X. Yi, K.Y. Lam, E. Bertino and F.Y. Rao.
“Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation”,
The 24th European Symposium on Research in Computer Security
(ESORICS 2019), 23-27 September, 2019, Luxembourg. https://doi.org/10.1007/978-3-030-29962-0_19.
70. X. Yi and K.Y. Lam. “A New Blind ECDSA Scheme for
Bitcoin Transaction Anonymity”, The 14th ACM Asia Conference on
Information, Computer and Communications Security (ASIACCS 2019), July 7th
– 2th, 2019, Auckland, New Zealand. DOI: 10.1145/3321705.3329816.
71. Y. Huang, AWK
Kong and K.Y. Lam. “Attacking Object
Detectors without Changing the Target Object”, The 16th Pacific Rim
International Conference on Artificial Intelligence (PRICA 2019), August 26th
– 30th 2019, 2019, Yanuca Island, Cuvu, Fiji. https://doi.org/10.1007/978-3-030-29894-4_1.
72. Y.W. Zhao, C.
Wang, C.H. Chi, W-J. van den Heuvel, K.Y.
Lam and S. Min. “Beyond the Power of Mere Repetition: Forms of Social
Communication on Twitter through the Lens of Information Flows and Its Effect
on Topic Evolution”, The 2019 International Joint Conference on Neural Networks
(IJCNN), July 14-19, 2019, Budapest,
Hungary. DOI: 10.1109/IJCNN.2019.8852290.
73. J.L. Guo,
W.Z. Yang, K.Y. Lam and X. Yi.
“Using Blockchain to Control Access to Cloud Data”, The 14th
International Conference on Information Security and Cryptology (Inscrypt 2018), December 14-17, 2018, Fuzhou, China,
Springer LNCS 11449. https://doi.org/10.1007/978-3-030-14234-6_15.
74. B.
Srinivasu, P. Vikramkumar, A. Chattopadhyay and K.Y. Lam. “CoLPUF:
A Novel Configurable LFSR-based PUF”, Proceedings of the 14th Asia
Pacific Conference on Circuits and Systems (APCCAS 2018), October 26-30, 2018,
Chengdu, China. Doi: 10.1109/APCCAS.2018.8605643.
75.
Y. Huang, A.W.K.
Kong and K.Y. Lam. “From the
Perspective of CNN to Adversarial Iris Images”, IEEE 9th
International Conference on Biometrics: Theory, Applications and Systems (BTAS
2018), October 22-25, 2018, Los Angeles, California, U.S. DOI:
10.1109/BTAS.2018.8698562.
76.
S. Bose, M. Raikwar, D. Mukhopadhyay, A. Chattopadhyay, K.Y. Lam. “BLIC: A Blockchain Protocol
for Manufacturing and Supply Chain Management of ICs”, The 2018 IEEE
International Conference on Blockchain (Blockchain-2018), July 30 – 3 August
2018, Halifax, Canada. DOI: 10.1109/Cybermatics_2018.2018.00229.
77.
Y.W. Zhao, C.
Wang, C.H. Chi, K.Y. Lam and S.
Wang. “A Comparative Study of Transactional and Semantic Approaches for
Predicting Cascades on Twitter”, Proceedings of the 27th
International Joint Conference on Artificial Intelligence (IJCAI -18), July
13-19, 2018, Stockholm, Sweden, pp 1212-1218, doi:10.24963/ijcai.2018/169.
78.
V. Pudi, A.
Chattopadhyay, K.Y. Lam. “Efficient
and Lightweight Quantized Compressive Sensing Using Mu-Law”, 2018 IEEE
International Symposium on Circuits and Systems (ISCAS 2018), May 27-30, 2018,
Florence, Italy, IEEE. Doi: 10.1109/ISCAS.2018.8351505.
79.
M. Raikwar, S. Mazumdar, S. Ruj,
S.S. Gupta, A. Chattopadhyay, K.Y. Lam.
“A Blockchain Framework for Insurance Processes”, 1st International Workshop on
Blockchains and Smart Contracts (BSC) in conjunction with the 9th IFIP
International Conference on New Technologies, Mobility and Security (IFIP
NTMS), February 26-28 2018, Paris, France, IEEE. Doi:
10.1109/NTMS.2018.8328731.
80.
A. Chattopadhyay
and K.Y. Lam. “Security of
autonomous vehicle as a cyber-physical system,” The 7th International Symposium on Embedded Computing and
System Design (ISED), Durgapur, 18-20 December, 2017, pp. 1-6, IEEE. doi: 10.1109/ISED.2017.8303906.
81.
S Sau, J.
Haj-Yahya, M.M. Wong, K.Y. Lam and
A. Chattopadhyay. “Survey of Secure Processors”, 2017 International Conference
on Embedded Computer Systems: Architectures, Modeling,
and Simulation (SAMOS 2017), 17-20 July, 2017, Pythagorion,
Greece, IEEE. Doi: 10.1109/SAMOS.2017.8344637.
82.
V. Sidorov, W.K.
Ng, K.Y. Lam, M.F. Bin Mohamed
Salleh. “Implications of Cyber Threats for the Design of Unmanned Air Traffic
Management System”, The 2017 International Conference on Unmanned Aircraft
Systems (ICUAS’17), FL, USA, June 13-16 2017.
DOI: 10.1109/ICUAS.2017.7991429.
83.
K.Y. Lam.
Securing the Internet of Thing: Cybersecurity from IT to OT, Chapter in
Navigating the Digital Age, 35-44, Forbes Media, 2016.
84.
K.Y. Lam, C.H.
Chi. “Identity in the Internet-of-Things (IoT): New Challenges and
Opportunities”, ICICS 2016: 18-26, Springer. https://doi.org/10.1007/978-3-319-50011-9_2.
1. Lam Kwok Yan, et. al. Method for
Generating Cryptographic Key from Biometric Data, Granted on 30 October
2009 (P-No. 139580). Singapore patent application number
200604906-8.
2. Lam Kwok Yan, et. al. Methods of
Robust Multi-Factor Authentication and Authorization and Systems Thereof,
Granted on 31 July 2012 (P-No. 175860). Singapore patent
application number 201108062-9.
3. Lam Kwok Yan, et. al. Method and
System of Secure Computing Environment having Auditable Control of Data
Movement, Granted on 31 July 2013 (P-No.
185640). Singapore patent application number 201208478-6.
4. Lam Kwok Yan, et. al. Method and
System of Secure Computer File Management and Storage having High Level of
Usability, Granted on 10 March 2016. Singapore
patent application number/Patent Number 11201510347T.
5. Lam Kwok
Yan, et. al. Privacy-Preserving
Neural Network Based on FHE Scheme, Fast Track Provisional Filing, 24
February 2022. Singapore provisional patent application number 10202201824W.
6. Lam Kwok
Yan, et. al. Optimization Of FHE Scheme For Non-Linear Functions: An Efficient Design
For LUT-Based Non-Linear Function Evaluation, Fast Track Provisional Filing, 13 May 2022.
Singapore provisional patent application number 10202205037W.
7. Lam Kwok
Yan, et. al. Privacy-Preserving Neural Network Model And Privacy-Preserving Prediction
Using The Privacy-Preserving Neural Network Model, PCT Patent International
Filing (claiming priority to earlier SG application nos. 10202201824W &
10202205037W), 15 February 2023, PCT Application No: PCT/SG2023/050085.
International Publication No: WO 2023/163652 A2, 31 August 2023.
8. Lam Kwok
Yan, et. al.
Efficient FHE-Based Training On Encrypted Data, 23 January 2024,
Singapore provisional patent application number 10202400198U.
9. Lam Kwok
Yan, et. al.
Two-Party Privacy-Preserving Subgraph Checking Over Unlabeled
Graphs, 15 April 2024, Singapore provisional patent application number
10202401083W, PCT Application No: PCT/SG2025/050258, International Filing Date:
14 April 2025.
10. Lam Kwok Yan, et. al. LEO Satellite IoT System Based On Deep
Learning And Blockchain, 17 July 2024, Singapore provisional patent
application number 10202402113X.
·
Ph.D. Candidates
§ HUANG Yi: Designing Adversarial Signals Against
Three Deep Learning and Non-deep Learning Methods (completed June 2021)
§ GUO Jiale: Privacy-enhancing
Mechanisms for Security Data Access and Analysis (completed September 2022)
§ YANG Wenzhuo: Machine
Learning Techniques for Advanced Cyber Attack Detection (completed August 2022)
§ TANG Kheng Leong (Part-time): Secure
and Privacy Preserving Sharing of Personal Health Records with Multi-Party
Pre-Authorization Verification (completed December 2022)
§ LI Zhi: Cross-domain Face
Presentation Attack Detection Techniques with Attention to Genuine Faces
(completed March 2023)
§ LIU Ziyao: MPC-Enabled Privacy-Preserving Machine Learning (completed May
2023)
§ CHEN Chen:
Knowledge Graph Embedding with Deep Learning (completed February 2024)
§ ZHANG Tinghao:
Optimization Strategy for Federated Learning (completed January 2025)
§ FAN Jiani: Enhancing Security
and Efficiency for the Internet of Vehicles Systems (completed May 2025)
§ HUANG Elmo: Efficient
Multi-Party Protocols for Distributed Systems
§ SI Peiyuan:
Hybrid Convex Optimization and Reinforcement Learning Method for Communication
Problems in Metaverse
§ PENG Minyi:
Model-Based Machine Unlearning: Scenario Specific Approach for Effective
Knowledge Removal and Privacy Protection
§ ZHENG Qichen:
Investigating the Robustness of Dynamic Neural Networks against Energy-Oriented
Attacks
§ YE Huanyi:
Machine Unlearning for AI Safety
§ GOH Siqi: Privacy-Preserving
Neural Network
§ LEE Nicholas: Deep Learning
Techniques for Knowledge Graph Profiling
§ JIANG Weifeng:
Towards Trustworthy and Interpretable LLM
§ PENG Hanli: AI Safety
§ ZHAO Yuqing:
Privacy-Preserving Machine Learning and Explainable AI
§ Parventanus MURTHY: AI Safey
§ ZHOU Kaiyu (Part-time): AI
Safety and Value Alignment
·
M.Eng. Candidates
§ HUANG Elmo (Part-time): Permissioned Blockchain for
Data Provenance in the Supply Chain with Fine Grained Data Authorization
(completed May 2021)
§ LIM Lucas (Part-time):
Privacy Preserving Data Analytics in Financial Inclusion and Crowd Computing
(completed May 2022)
§ SHEN Jiyuan:
Data-Efficient and Privacy-Enhanced Knowledge Discovery (completed November
2024)
§ SHEN Bowen:
Privacy-Preserving Resource Management in LEO Satellite Internet-of-Things
(completed February 2025)
§ CHEN Yi: Safe AI for Next
Generation Networks