Dr. W. K. ING works in machine learning applications in wealth management, risk and compliance, privacy-preserving techniques, encrypted databases, blockchain systems, and data security. His work is motivated by the need to harness the power of data for the betterment of stakeholders, where the data has confidentiality and privacy issues; where the data may be owned and held by different stakeholders, and where the data is so large that it must be hosted in cloud servers that are never completely secured (susceptible to insider and cyber attacks). He contributes to companies and industries as technology consultant on projects involving data analytics, artificial intelligence, data privacy and security, and blockchain. In recent years, his involvement in conferences and workshop can be found here. His work is supported by various research grants, which can be found here. He is Associate Editor and Member of Editorial Boards of five journals. Over the years, he has worked with many talented students on their PhD and Master theses. Dr. ING writes for online magazines and newspapers and contributes to social causes.
"A man's character may be learned from the adjectives which he habitually uses in conversation." - Mark Twain
Current Research and Industry-inspired Projects
Secure Federated AI + Blockchain Systems: In an environment where multiple parties, each having private, local data but would like to benefit from big-picture analysis of all parties' data, Federated AI is a cost effective approach to reduce secure computations but still achieving the effect of secure multiparty computations. However, a federated scenario still suffers from two major attacks: data leakage and data poisoning. We developed security protocols to address data leakage so that the entire federated approach is secure against malicious parties. We also developed schemes to increase the cost and decrease the benefits of malicious parties attempting to poison the federated approach. This is a funded project and we are exploring its application in financial institutions. Some of our websites:
commendo.vercel.app,
blockchainix.vercel.app, and
prismadb.com.
Artificial Intelligence and Machine Learning for Risk and Compliance: Money laundering is a known risk in the financial system. The United Nations believes that the estimated value of money laundering worldwide, according to recent statistics, is between 2% and 5% of the world's GDP. That's approximately $800 billion to $2 trillion laundered annually (2021). In collaboration with the Wealth Management Institute, we researched into the use of artificial intelligence and machine learning to counter money laundering. We successfully developed a software system that aggregates multiple AI models to gather different kinds of evidence of suspicious activities. Info on the AMLNOVO system we developed: AMLnovo.co.
Artificial Intelligence and Machine Learning for Wealth Management: Wealth management's objective is to maximize returns for a portfolio of investment instruments with respect to acceptable risk. It is an area that is traditionally studied in finance but now explored using AI/ML techniques as there is a collection of computational optimization problems. In collaboration with investment companies, we look into the materialization of AI models for different aspects of the wealth management process and the development of an overall software system to piece all the models together.
"Nearly all men can stand adversity, but if you want to test a man's character, give him power." - Abraham Lincoln
Data Security / Blockchain
H. F. Zhu, W. K. Ng, “Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol”, 36th International Conference on Advanced Information Networking and Applications (AINA2022), Sydney, Australia, Apr 2022.
H. F. Zhu, W. K. Ng, “Highly Scalable Beaver Triple Generator from Additive-only Homomorphic Encryption”, 36th International Conference on Advanced Information Networking and Applications (AINA2022), Sydney, Australia, Apr 2022.
V. Sidorov, E. Y. Fan Wei, W. K. Ng, “Comprehensive Performance Analysis of Homomorphic Cryptosystems for Practical Data Processing”, CoRR abs/2202.02960, 2022.
W. K. Ng, N. Jayasuriya, D. Minura, A. Kusuma, M. H. Foo, "Security Architecture with Privacy Protection for Cross-bank Data Analysis", Technical Report, Wealth Management Institute, Jun 2021.
E. Bandara, X. Liang, P. Foytik, W. K. Ng, “Promize - Blockchain and Self Sovereign Identity Empowered Mobile ATM Platform”, Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 2 (Lecture Notes in Networks and Systems, 284), 2021.
Eranga Herath, Xueping Liang, Pete Foytik, Sachin Shetty, Crissie Hall, Dan Bowden, Nalin Ranasinghe,Kasun De Zoysa, W. K. Ng, "Connect – Blockchain and Self-Sovereign Identity Empowered Contact Tracing Platform," 9th EAI International Conference on Wireless Mobile Communication and Healthcare, Dec 2020.
E. Bandara, X. Liang, P. Foytik, S. Shetty, N. Ranasinghe, K. De Zoysa, W. K. Ng, “SaaS Microservices-Based Scalable Smart Contract Architecture”, International Symposium on Security in Computing and Communications (SSCC2020) pp. 228–243, Chennai, India, Oct 2020.
Bandara E. et al. (2020) Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems. In: Chen Z., Cui L., Palanisamy B., Zhang LJ. (eds) Blockchain – ICBC 2020. ICBC 2020. Lecture Notes in Computer Science, vol 12404. Springer, Cham. https://doi.org/10.1007/978-3-030-59638-5_12
S. Sharma, W. K. Ng, "Scalable, On-Demand Secure Multiparty Computation for Privacy-Aware Blockchains," International Conference on Blockchain and Trustworthy Systems, Guangzhou, China, Dec 2019.
E. Bandara, W. K. Ng, "Aplos: Smart Contracts Made Smart," International Conference on Blockchain and Trustworthy Systems, Guangzhou, China, Dec 2019.
H. F. Zhu, W. K. Ng, "Transitive Pseudonyms Mediated EHRs Sharing for Very Important Patients", International Conference on Web Services, San Diego, USA, June 2019.
H. F. Zhu, W. K. Ng, "Sustainable Data Management Strategies and Systems in Untrusted Cloud Environments," 6th International Conference on Information Technology: IoT and Smart City (ICIT 2018), Hong Kong, Dec 2018.
E. Bandara, W. K. Ng, K. De Zoysa, N. Fernando, S. Tharaka, P. Maurakirinathan, N. Jayasuriya, "Mystiko: Blockchain Meets Big Data," IEEE Big Data Conference, San Francisco, USA, Dec 2018.
H. G. Do, W. K. Ng, "Multi-dimensional Range Query on Outsourced Database with Strong Privacy Guarantee," International Journal of Computer Network and Information Security (IJCNIS), Vol. 9, No. 10, Oct 2017.
N. A. Huynh, W. K. Ng, "Predicting Risk Level of Executables: An Application of Online Learning," 20th International Conference on Discovery Science (DS'17), Kyoto, Japan, Oct 15-17, 2017.
V. Sidorov, W. K. Ng, M. Faisal, K. Y. Lam, "Cyber-Threat Analysis of a UAV Traffic Management System for Urban Airspace," ATRS World Conference 2017, Antwerp, Belgium, Jul 2017.
H. G. Do, W. K. Ng, "Blockchain-based System for Secure Data Storage with Private Keyword Search," IEEE World Congress on Services, Honolulu, HI, USA, Jun 2017.
V. Sidorov, W. K. Ng, M. Faisal, K. Y. Lam, "Implications of Cyber Threats for the Design of Unmanned Air Traffic Management System Presentation format," 2017 International Conference on Unmanned Aircraft Systems (ICUAS'17), Miami, Florida, USA, Jun 13-16, 2017.
H. G. Do, W. K. Ng, "Multidimensional Range Query on Outsourced Database with Strong Privacy Guarantee," 14th International Conference on Privacy, Security and Trust, pp. 555-560, Auckland, New Zealand, Dec 2016.
T. N. Ho, W. K. Ng, "Application of Stylometry to DarkWeb Forum User Identification," 18th International Conference Information and Communications Security (ICICS'16), Singapore, Nov 2016.
H. G. Do, W. K. Ng, "Private Boolean Query Processing on Encrypted Data," 18th International Conference Information and Communications Security (ICICS'16), Singapore, Nov 2016.
N. A. Huynh, W. K. Ng, H. G. Do, "On Periodic Behavior of Malware: Experiments, Opportunities, and Challenges," 11th International Conference on Malicious and Unwanted Software, Fajardo, Puerto Rico, Oct 18-21, 2016.
N. A. Huynh, W. K. Ng, "Uncovering Periodic Network Signals for Cyber Attacks," 13th IEEE Symposium on Visualization for Cyber Security (VizSec'16), Baltimore, USA, Oct 24, 2016.
D. H. Tran, W. K. Ng, "Incremental Privacy-Preserving Association Rule Mining Using Negative Border," 11th Pacific Asia Workshop on Intelligence and Security Informatics (PAISI'16), held in conjunction with PAKDD 2016, Auckland, New Zealand, Apr 2016.
V. Sidorov, W. K. Ng, "Towards Performance Evaluation of Oblivious Data Processing Emulated with Partially Homomorphic Encryption Schemes," 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), New York, Apr 2016.
V. Sidorov, W. K. Ng, "A Confidentiality-Preserving Search Technique for Encrypted Relational Cloud Databases," 2nd IEEE International Conference on Big Data Computing Service and Applications (BigDataSerivce), Oxford, UK, Apr 2016.
H. G. Do, W. K. Ng, "Privacy-preserving Triangle Counting in Distributed Graphs," 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), Crans-Montana, Switzerland, Mar 23-25, 2016.
K. Ariyapala, H. G. Do, N. A. Huynh, W. K. Ng, M. Conti, "A Host and Network Based Intrusion Detection For Android Smartphone," Workshop on Security, Trust, Privacy and Analytics (STPA-2016), held in conjunction with 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), Crans-Montana, Switzerland, Mar 23-25, 2016.
V. Sidorov, W. K. Ng, "Model of an Encrypted Relational Database Supporting Complex Predicates in WHERE Clause," IEEE 11th World Congress on Services, Jun 2015, New York, USA.
H. G. Do, W. K. Ng, "Privacy-Preserving Approach for Sharing and Processing Intrusion Alert Data," IEEE 10th International Conference on Intelligent Sensors (ISSNIP), Singa- pore, Apr 2015.
V. Balachandran, W. K. Ng, S. Emmanuel, "Obfuscation by Code Fragmentation to Evade Reverse Engineering," IEEE International Conference on Systems, Man, and Cybernetics, San Diego, California, Oct 2014.
V. Balachandran, W. K. Ng, S. Emmanuel, "Function Level Control Flow Obfuscation for Software Security," 8th International Conference on Complex, Intelligent, and Software Intensive Systems, Birmingham, UK, Jul 2014.
V. Sidorov, W. K. Ng, "Model of an Encrypted Cloud Relational Database Supporting Complex Predicates in WHERE Clause," IEEE International Conference on Cloud Computing, Anchorage, Alaska, Jun 2014.
H. G. Do, W. K. Ng, "Secure Reachability Query on Private Shared Graphs," IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Singapore, Apr 2014.
R. P. Lua, C. H. Wah, W. K. Ng, "Cornstarch Effect: Intensifying flow resistance for increasing DDoS attacks in Autonomous Overlay Networks," 11th Annual IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, Jan 2014.
R. P. Lua, W. K. Ng, "Autonomic Swarms for Regenerative and Collaborative Networking," 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Work-sharing, Austin, Texas, Oct 2013.
H. G. Do, W. K. Ng, Z. Ma, "Privacy-preserving Social Network," 2nd International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2013), Karlsruhe, Germany, Sep 2013.
V. Sidorov, W. K. Ng, "Complex Queries in a Shared Multi-user Relational Cloud Database," IEEE International Conference on Cloud Computing, Santa Clara, California, Jun 2013.
J. L. Lim, V. Balachandran, S. Emmanuel, W. K. Ng, "Obfuscating Server Client Programs against Reverse Engineering," Second National Conference on Emerging Trends In Computing, India, Jun 2013.
M. Xu, W. K. Ng, F. Liu, "An Enterprise-grade Secure Data Storage and Sharing System," 2nd International Conference on Cyber Security, Cyber Warfare and Digital Forensic, Kuala Lumpur, Malaysia, Mar 2013.
T. H. Nguyen, H. G. Do, W. K. Ng, H. Zhu, "Cloud-Enabled Data Sharing Model", IEEE International Conference on Intelligence and Security Informatics (ISI2012), Washington DC, Jun 2012.
W. K. Ng, Y. Wen, H. Zhu, "Private Data Deduplication Protocols in Cloud Storage," 27th ACM Symposium on Applied Computing (SAC2012), Riva del Garda (Trento), Italy, Mar 2012.
D. H. Tran, W. K. Ng, "Towards Security in Sharing Data on Cloud-Based Social Networks," 8th International Conference on Information, Communications, and Signal Processing (ICICS 2011), Singapore, Dec 2011.
W. K. Ng, Y. Wen, H. Zhu, "Private query processing on MapReduce," 3rd IEEE Latin-American Conference on Communications (Latincom2011), Belemdo Para, Brazil, Oct 2011.
"Education without values, as useful as it is, seems rather to make man a more clever devil." - C. S. Lewis
Privacy Protection Techniques
J.-B. Ong, W. K. Ng, I. Tjuawinata, C. Li, J. Yang, S. N. Myne, H. Wang, K.-Y. Lam, C.-C. Jay Kuo: “Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation”, CoRR abs/2101.04194 (2021)
H. Zhu, S. M. Goh, W. K. Ng, “Privacy-preserving Weighted Federated Learning within the Secret Sharing Framework”, IEEE Access 8: 198275-198284 (2020)
Prince, Hati, A.S., Chakrabarti, P., W. K. Ng, “Development of energy efficient drive for ventilation system using recurrent neural network”, Neural Computing and Applications, 6 Jan 2021. https://doi.org/10.1007/s00521-020-05615-x
M. A. Masood, R. A. Abbasi, W. K. Ng, “Context-Aware Sliding Window for Sentiment Classification,” in IEEE Access, vol. 8, pp. 4870–4884, 2020. doi: 10.1109/ACCESS.2019.2963586.
H. G. Do, W. K. Ng, "Private Personal Information Verification", Journal of Information Security, Vol. 8 No. 3, 2017.
D. H. Tran, W. K. Ng, "Incremental Privacy-Preserving Association Rule Mining," 11th Pacific Asia Workshop on Intelligence and Security Informatics (PAISI'16), held in conjunction with PAKDD 2016, Auckland, New Zealand, Apr 2016.
F. Liu, W. K. Ng, W. Zhang, "Encrypted SVM for Outsourced Data Mining," 8th IEEE International Conference on Cloud Computing, Jun 2015, New York, USA.
F. Liu, W. K. Ng, W. Z, "Secure Scalar Product for Big-Data in MapReduce," IEEE International Conference on Big Data Computing Service and Applications, San Francisco, CA, Apr 2015.
F.Liu, W.Z, W.K.Ng, "Encrypted Association Rule Mining for Outsourced Data Mining," 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015) Gwangju, Korea, Mar 25-27, 2015.
F. Liu, W. Z, W. K. Ng, "Encrypted Gradient Descent Protocol for Outsourced Data Mining," 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015) Gwangju, Korea, Mar 25-27, 2015.
L. Fang, W. K. Ng, W. Zhang, "Encrypted Scalar Product Protocol for Outsourced Data Mining," IEEE International Conference on Cloud Computing, Anchorage, Alaska, Jun 2014.
F. Liu, W. K. Ng, W. Zhang, H. G. Do, S. Han, "Encrypted Set Intersection Protocol for Outsourced Data-sets," IEEE International Conference on Cloud Engineering, Boston, Massachusetts, Mar 2014.
W. Zha, W. K. Ng, "Privacy-Preserving in-network Aggregation in Wireless Sensor Network," 1st International Conference on Sensor Networks (SENSORNETS2012), Rome, Italy, Feb 2012.
D. H. Tran, W. K. Ng, "An Efficient Cacheable Secure Scalar Product Protocol for Privacy-Preserving Data Mining," 13th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2011), Toulouse, France, Aug 2011.
S. Han, W. K. Ng, L. Wan, C. S. Lee, "Privacy-Preserving Gradient Descent Methods", IEEE Transactions on Knowledge and Data Engineering, pp. 884-899, Vol. 22, No. 6, June 2010.
H. D. Tran, W. K. Ng, "CRYPPAR: An Efficient Framework for Privacy Preserving Association Rule Mining over Vertically Partitioned Data", IEEE Region 10 Conference on Emerging Technologies for Sustainable Development (TENCON'09), Singapore, Nov 2009.
K. Zhai, W. K. Ng, A. R. Herianto, S. Han, "Speeding Up Secure Computations via Embedded Caching", 9th SIAM International Conference on Data Mining (SDM'09), Sparks, Nevada, USA, May 2009.
S. Han, W. K. Ng, P. S. Yu, "Privacy Preserving Singular Value Decomposition", IEEE International Conference on Data Engineering (ICDE'09), Shanghai, China, Apr 2009.
S. Han, W. K. Ng, "Multi-Party Privacy-Preserving Decision Trees for Arbitrarily Partitioned Data", International Journal on Intelligent Control and Systems, Special Issue on Information Assurance, 2008.
S. Han, W. K. Ng, "Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining", SIAM International Conference on Data Mining (SDM 2008), Atlanta, Georgia, Apr 24-26, 2008.
S. Han, W. K. Ng, "Privacy-Preserving Linear Fisher Discriminant Analysis", Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2008), Osaka, Japan, May 20-23, 2008.
S. Han, W. K. Ng, "Privacy-Preserving Self-Organizing Map", 9th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2007), Regensburg, Germany, 3-7 Sep 2007.
S. Han, W. K. Ng, "Privacy-Preserving Genetic Algorithms for Rule Discovery", 9th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2007), Regensburg, Germany, 3-7 Sep 2007.
W. Li, W. K. Ng, S. Han, V. C. S. Lee, "Privacy-Preservation for Gradient Descent Methods", 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, Aug 12-15, 2007.
"If you bring forth what is within you, what you bring forth will save you. If you do not bring forth what is within you, what you do not bring forth will destroy you." - Jesus Christ
Machine Learning / Artificial Intelligence
W. K. Ng, N. Jayasuriya, D. Minura, A. Kusuma, M. H. Foo, "AML Model Validation using Artificial Intelligence and Machine Learning", Technical Report, Wealth Management Institute, Jun 2021.
W. K. Ng, N. Jayasuriya, D. Minura, A. Kusuma, M. H. Foo, "AML Framework and Model using Artificial Intelligence and Machine Learning", Technical Report, Wealth Management Institute, Dec 2020.
W. K. Ng, N. Jayasuriya, D. Minura, A. Kusuma, M. H. Foo, "AML Industry Reference Model using Artificial Intelligence and Machine Learning", Technical Report, Wealth Management Institute, Dec 2020.
N. A. Huynh, W. K. Ng, "Learning under Concept Drift with Follow the Regularized Leader and Adaptive Decaying Proximal," Expert Systems with Applications, Vol. 96, pp. 49-63 Apr 2018.
J. B. Ong, W. K. Ng, C.-C. Jay Kuo, “Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition,” CoRR abs/1812.02622 (2018)
J. B. Ong, W. K. Ng, "Hybrid Subspace Mixture Models For Prediction and Anomaly Detection in High Dimensions," 12th International Conference on Advanced Data Mining and Applications (ADMA'17), Singapore, Nov 5-6, 2017.
S. Li, W. L. Tung, W. K. Ng, "A Novelty Detection Machine and Its Application to Bank Failure Prediction," Neurocomputing, 130 (2014).
S. Li, W. K. Ng, "Maximum Volume Outlier Detection and Its Applications in Credit Risk Analyses," International Journal on Artificial Intelligence Tools, Vol. 22, No. 5, 2013.
H. H. Ang, V. Gopalkrishnan, C. H. Hoi, W. K. Ng, "Classification in P2P Networks with Cascade Support Vector Machines," ACM Transactions on Knowledge Discovery from Data, accepted for publication on May 20, 2013.
L. Zhu, W. K. Ng, J. Cheng, "Structure and Attribute Index for Approximate Graph Matching in Large Graphs," Information Systems, pp. 958-972, Vol. 36, Iss. 6, Sep 2011.
L. Zhu, W. K. Ng, S. Han, "Classifying Graphs using Theoretical Metrics: A Study of Feasibility," International Workshop on Graph-structured Data Bases (GDB2011), in conjunction with 16th International Conference on Database Systems for Advanced Applications (DASFAA'11), Hong Kong, 22-25 Apr 2011.
B. Ramadhana, B. Choi, W. K. Ng, "Incremental Maintenance of 2-hop Labeling of Large Graphs", IEEE Transactions on Knowledge and Data Engineering, pp. 682-698, Vol. 22, No. 5, May 2010.
H.-H. Ang, V. Gopalkrishnan, W. K. Ng, S. C. H. Hoi, "Adaptive Ensemble Classification in P2P Networks," Database Systems for Advanced Applications (DASFAA'10), Tsukuba, Japan, 1-4 April 2010: 34-48.
H.-H. Ang, V. Gopalkrishnan, W. K. Ng, S. C. H. Hoi, "On Classifying Drifting Concepts in P2P Networks," European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD'10), Catalonia, Spain, 20-24 September 2010: 24-39.
H.-H. Ang, V. Gopalkrishnan, W. K. Ng, S. C. H. Hoi, "P2PDocTagger: Content management through automated P2P collaborative tagging," 36th International Conference on Very Large Data Bases (VLDB'10), Singapore, 13-17 September 2010: 1601-1604.
H. K. Ang, V. Gopalkrishnan, A. Datta, W. K. Ng, C. H. Hoi, "SATRAP: Data and Network Heterogeneity Aware P2P Data Mining", 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD'10), Hyderabad, India, Jun 21-24 2010.
M. Ayyappan, Y.-K. Wong, W. K. Ng, "MICHO: A Scalable Constraint-Based Algorithm for Learning Bayesian Networks", 25th ACM Symposium on Applied Computing, Sierre, Switzerland, Mar 22-26, 2010.
H. H. Ang, V. Gopalkrishnan, W. K. Ng, C. H. Hoi "Communication-efficient classification in P2P networks", European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD'09), Bled, Slovenia, Sep 7-11, 2009.
L. Zhu, B. Choi, W. K. Ng, B. He, "A Uniform Framework for Ad-hoc Indexes to Answer Reachability Queries on Large Graphs", 14th International Conference on Database Systems for Advanced Applications (DASFAA'09), Brisbane, Australia, Apr 2009.
J. S. Sekhon, V. Gopalkrishnan, W. K. Ng, "Proportionate Feature Selection- A Pre-Processing Step for Clustering", IEEE International Conference on Systems, Man, and Cybernetics (SMC 2008), Singapore, 12-15 Oct 2008.
H. K. Ang, V. Gopalkrishnan, C. H. Hoi, W. K. Ng, "Classification in P2P Networks by Bagging Cascade RSVMs", 6th International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P 2008), held in conjunction with VLDB 2008, Auckland, New Zealand, 23 Aug 2008.
H. K. Ang, V. Gopalkrishnan, C. H. Hoi, W. K. Ng, "Cascade RSVM in Peer-to-Peer Network", European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2008), Antwerp, Belgium, 15-19 Sep 2008.
B. Ramadhana, K. K. Choi, W. K. Ng, "On Incremental Maintenance of 2-hop Labeling of Graphs", 17th International World Wide Web Conference (WWW 2008), Beijing, China, Apr 21-25, 2008.
S. Han, W. K. Ng, Y. Yu, "Frequent Substructure Pattern Mining", Sixth International Conference on Information, Communications and Signal Processing (ICICS 2007), 10-13 Dec 2007, Singapore.
W. Li, W. K. Ng, K.-L. Ong, "Enhancing the Effectiveness of Clustering with Spectra Analysis", IEEE Transactions on Knowledge and Data Engineering, Jul 2007.
"It is a man's own mind, not his enemy or foe, that lures him to evil ways." - Buddha
Streaming Data Analytics
H. L. Nguyen, W. K. Ng, D. Woon, "Closed Motifs for Streaming Time Series Classification," Knowledge and Information Systems Journal, accepted for publication on May 9, 2013.
W. Zha, W. K. Ng, "Geographic Routing with Cross Links", 7th International Conference on Knowledge, Information and Creativity Support Systems (KICSS'12), Melbourne, Australia, Nov 2012.
H. L. Nguyen, W. K. Ng, D. Woon, "Heterogeneous Ensemble for Feature Drifts in Data Streams," 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2012), Malaysia, Jun 2012.
W. Zha, W. K. Ng, "Moving Geographic Routing to Practice," IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems, Thailand, May 2012.
W. Zha, W. K. Ng, "Developing Practical Geographical Routing Protocols," 1st International Conference on Sensor Networks (SENSORNETS2012), Rome, Italy, Feb 2012.
W. Zha, W. K. Ng, "Prolonging Lifespan of Sensor Networks using Redundant Nodes," Ad Hoc & Sensor Wireless Networks Journal, Accepted for publication Jan 2012.
H. L. Nguyen, W. K. Ng, "Concurrent Semi-Supervised Learning of Data Streams," 13th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2011), Toulouse, France, Aug 2011.
W. Zha, W. K. Ng, "Predict Energy Consumption of Trigger-driven Sensor Network by Markov Chains," Eighth Workshop on Wireless Ad hoc and Sensor Networks WWASN2011, in conjunction with 31st International Conference on Distributed Computing Systems (ICDCS'11), Minneapolis, 21-24 Jun 2011, USA
W. Zha, W. K. Ng, "Energy-Efficient Return-Path Routing in Wireless Sensor Networks", IEEE Region 10 Conference on Emerging Technologies for Sustainable Development (TENCON'09), Singapore, Nov 2009.
L. Wan, W. K. Ng, X. H. Dang, P. S. Yu, K. Zhang, "Density-Based Clustering of Data Streams at Multiple Resolutions", ACM Transactions on Knowledge Discovery from Data, Vol. 3, No. 3, Jul 2009.
X. H. Dang, W. K. Ng, K.-L. Ong, "Incremental and Adaptive Clustering Stream Data over Sliding Window", 20th International Conference on Database and Expert Systems Applications, Linz, Austria, 31 Aug- 4 Sep, 2009.
X. H. Dang, W. K. Ng, "An EM-based algorithm for Clustering Data Streams in Sliding Windows", 14th International Conference on Database Systems for Advanced Applications (DASFAA'09), Brisbane, Australia, Apr 2009.
S. J. Phua, X. Li, B. S. Lim, J. H. Zhou, W. K. Ng, "Signal Stream Clustering for Cutter-Rotation-Level Tool Condition Monitoring in Milling Process", Annual Conference of the Prognostics and Health Management Society, San Diego, CA Sep 27-Oct 1, 2009.
X. H. Dang, W. K. Ng, K.-L. Ong, V. C. S. Lee, "Discovering Frequent Sets from Data Streams with CPU Constraint", 6th Australasian Data Mining Conference (AusDM'07), Gold Coast, Australia, 3-4 Dec 2007 [Best Paper Award].
X. H. Dang, W. K. Ng, "Frequent Sets Mining in Data Stream Environments", Encyclopedia of Data Warehousing and Mining (2nd Ed. ), IGI Publishing, 2007.
X. H. Dang, W. K. Ng, K.-L. Ong, "An Error Bound Guarantee Algorithm for Online Mining Frequent Sets over Data Streams", Journal of Knowledge and Information Systems, 2007.
"The only man who never makes a mistake is the man who never does anything." - Theodore Roosevelt
Product Configuration Techniques
L.Wang, W. K. Ng, "Hybrid solving algorithms for an extended dynamic constraint satisfaction problem based configuration system," Concurrent Engineering: Research and Applications, Vol. 20, No. 3, pp. 223-236, 2012.
L. Wang, W. K. Ng, "A Hybrid Solving Algorithm for DCSP-Based Configuration System," 8th International Conference on Information, Communications, and Signal Processing (ICICS 2011), Singapore, Dec 2011.
L. Wang, W. K. Ng, "Extended DCSP Approach on Product Configuration with Cost Estimation," Concurrent Engineering: Research and Applications, pp. 123-138, Vol. 19, No. 2, Jun 2011.
L. Wang, W. K. Ng, B. Song, "Constraint Satisfaction Approach on Product Configuration with Cost Estimation", 22nd International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA-AIE 2009), Taiwan, Jun 2009.
L. Wang, W. K. Ng, B. Song, "Semantic Modeling for DCSP-based Product Configuration", IEEE Region 10 Conference on Emerging Technologies for Sustainable Development (TENCON'09), Singapore, Nov 2009.
L. Wang, W. K. Ng, B. Song, "Sustaining Product Competitiveness with CSP on Product Configuration and Lifecycle Cost", IEEE Region 10 Conference on Emerging Technologies for Sustainable Development (TENCON'09), Singapore, Nov 2009.
H. Liu, V. Gopalkrishnan, W. K. Ng, "Regression Models for Estimating Product Lifecycle Cost", International Journal of Intelligent Manufacturing, Vol. 20, No. 4, pp. 401-408, Aug 2009.
H. Liu, W. K. Ng, V. Gopalkrishnan, S. Bin, X. Li, "An Intelligent System for Estimating Full Product Lifecycle Cost at the Early Design Stage", Special Issue of the International Journal of Product Lifecycle Management (IJPLM), Vol. 3, No. 2/3, pp. 96-113, 2008 [Acceptance rate 18.6%].
Y. L. Huang, W. K. Ng, W. F. Lu, B. Song, X. Li., "Towards Automatically Generating Constraint-based Configuration Knowledge", Journal of Manufacturing Technology Management, Vol. 19, No. 6, pp. 744-754, 2008.
H. F. Liu, V. Gopalkrishnan, W. K. Ng, B. Sin, X. Li, "Estimating Product Lifecycle Cost Using a Hybrid Approach", Special issue of the International Journal of Product Lifecycle Management, Vol. 20, No. 4, pp. 401-408, Aug 2009.
Y. Huang, H. Liu, W. K. Ng, B. Song, X. Li, "Towards automatically generating constraint-based configuration knowledge", International Conference on Manufacturing Automation, Singapore, May 2007 [Highly Recommended Paper Award].
H. Liu, W. K. Ng, B. Song, X. Li, W. F. Lu, "Enabling Mass Customization Through Semantic Web Services", IEEE Asia-Pacific Services Computing Conference (APSCC 2007), Tsukuba, Japan, 11-14 Dec 2007.
Y. Huang, W. K. Ng, H. F. Liu, "Deriving Configuration Knowledge and Evaluating Product Variants Through Intelligent Techniques", Sixth International Conference on Information, Communications and Signal Processing (ICICS 2007), 10-13 Dec 2007, Singapore.
H. F. Liu, V. Gopalkrishnan, W. K. Ng, B. Song, X. Li, "Estimating Product Lifecycle Cost Using a Hybrid Approach", 2nd IEEE International Conference on Digital Information Management (ICDIM 2007), 28-31 October 2007, Lyon, France.
B. S. Lim, X. Li, J. Zhou, K. M. Goh, T. W. Tan, W. K. Ng, "Online Self-Learning Design of an Integrated Automated Laboratory Line," 31st Annual Conference of the IEEE Industrial Electronics Society- IECON'05, 2005
L. Wang, B. Song, W. K. Ng, X. Li, "A Product Family Based Life Cycle Cost Model for Part Variety and Change Analysis", 16th International Conference on Engineering Design (ICED'07), Paris, France, Aug 28-31, 2007.
S. J. Phua, W. K. Ng, H. Liu, B. Song, X. Li, "A Rule Mining Approach to Emotional Design in Mass Customization", 16th International Conference on Engineering Design (ICED'07), Paris, France, Aug 28-31, 2007.
X. Li, S. J. Phua, W. K. Ng, H. Liu, B. Song, "Customer Preference Reasoning Analysis Through Text Categorization", 16th International Conference on Engineering Design (ICED'07), Paris, France, Aug 28-31, 2007.
H. F. Liu, W. K. Ng, B. Song, X. Li, W. F. Lu, "An Intelligent Information System for Enabling Product Mass Customization," 9th International Conference on Enterprise Information Systems, Portugal, June 2007.
S. J. Phua, W. K. Ng, H. Liu, B. Song, X. Li, "Customer Information System for Product and Service Management: Towards Knowledge Extraction from Textual and Mixed-Format Data", 4th IEEE International Conference on Service Systems and Service Management (ICSSSM2007), Chengdu, China, Jun 9-11, 2007.
Y. L. Huang, W. K. Ng, H. Liu, W. F. Lu, B. Song, X. Li, "Semantic Modeling and Extraction for Cross-family Product Configuration", 4th IEEE International Conference on Service Systems and Service Management (ICSSSM2007), Chengdu, China, Jun 9-11, 2007.
B. Song, X. Li, W. K. Ng, "A Framework for An Intelligent Design-support System Based on Product Lifecycle Data," Int. Conf. Product Lifecycle Management (PLM'06), Bangalore, India, 2006
"The superior man thinks always of virtue; the common man thinks of comfort." - Confucius
Other Work
V. Sidorov, W. K. Ng, M. F. Bin Mohamed Salleh, "A Practical Expert System with (Near) Real-Time Analysis of Large Spatial Sets of Air Traffic Data,” BigData Conference, San Francisco, USA, Dec 2018.
A. P. Kusuma, O. N. N. Fernando, V. U. Wanniarachchi, W. K. Ng, "Poster: Audio Fingerprint Application for the Media Industry," International Symposium on Wearable Computers (ISWC), Singapore, Oct 2018.
Z. Shi, W. K. Ng, "A Collision-Free Path Planning Algorithm for Unmanned Aerial Vehicle Delivery," 2018 International Conference on Unmanned Aircraft Systems, Dallas, Texas, USA, Jun 2018.
J. B. Ong, W. K. Ng, T. H. Ho, A. Vorobev, "Groupon and Groupon Now: Participating Firm's Profitability Analysis", Computational Economics, pp. 1-16, Sep 2017.
S. C. Guntuku, W. Lin, W. K. Ng, L. H. Ungar, D. Preotiuc-Pietro, "Studying Personality through the Content of Posted and Liked Images," 9th International ACM Web Science Conference, Troy, NY, USA, Jun 2017.
D. Rao, W. K. Ng, "A method to compensate users for their information utility," 2nd IEEE International Conference on Big Data Intelligence and Computing, Auckland, New Zealand, August 8-12, 2016
D. Rao, W. K. Ng, "Information Pricing - A User-data-centric Method to Price Information," 23rd IEEE International Conference on Web Services (ICWS), San Francisco, USA, Jun 27-Jul 2, 2016.
D. Rao, W. K. Ng, "A Method to Price Your Information Asset in The Information Market," 5th IEEE International Congress on Big Data, San Francisco, USA, Jun 27-Jul 2, 2016.
D. Rao, W. K. Ng, "Monetizing the User's Information Asset in Internet Information Market," 5th IEEE International Congress on Big Data, San Francisco, USA, Jun 27-Jul 2, 2016.
S. C. Guntuku, S. Roy, W. Lin, K. Ng, W. K. Ng, V. Jakhetiya, "Personalizing User Interfaces for improving quality of experience in VoD recommender systems," 8th International Conference on Quality of Multimedia Experience (QoMEX'16), Lisbon, Portugal, Jun 6-8, 2016.
D. Rao, W. K. Ng, "A User-centric Approach to Pricing Information," 2nd IEEE International Conference on Big Data Computing Service and Applications (BigDataSerivce), Oxford, UK, Apr 2016.
L. Z. Zhang, F. Li, J. Zhang, W. K. Ng, "Robustness of Trust Models and Combinations for Handling Unfair Ratings," 6th IFIP WG 11.11 International Conference on Trust Management, Surat, India, May 2012.
L. Zhang, H. Fang, W. K. Ng, J. Zhang, "IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation," 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2011), Changsha, China, Nov 2011.
L. Zhang, C. P. Tan, S. Li, H. Fang, P. Rai, Y. Chen, L. Rohit, W. K. Ng, "The Influence of Interaction Attributes on Trust in Virtual Communities Trust," Reputation and User Modeling Workshop (TRUM'11), held in conjunction with the International Conference on User Modeling Adaptation and Personalization (UMAP2011), Girona, Spain, Jul 2011.
T. Y. Chong, W. T. Ng, Q. Gu, W. K. Ng, "A Study of Green IT Strategies for Going Green Organizations," Annual International Conference on Green Information Technology (GreenIT'10), Singapore, October 2010.
"Criticism, like rain, should be gentle enough to nourish a man's growth without destroying his roots." - Frank A. Clark
Research Grants
Co-Principal Investigator, " Enabling Advanced Search Function in Encrypted Data Back-ups", Singapore Cybersecurity Consortium Seed Grant, Nov 2021-Dec 2022.
Co-Principal Investigator, "WEAVE 2.0 – Tokenization Platform for Secure Collaborative Analysis of Sensitive Data", Singapore Cybersecurity Consortium Seed Grant, Jan 2020-Jul 2021.
Principal Investigator, "Artificial Intelligence & Machine Learning for Anti-Money Laundering", Financial Sector Development Fund, Mar 2019-Sep 2020.
Principal Investigator, "Blockchain for Cross Region Air Traffic Management", Air Traffic Management Research Institute, Nov 2018-Nov 2019.
Principal Investigator, "Confidentiality and Privacy-preserving Blockchain", Ministry of Education, Nov 2018-Nov 2019.
Principal Investigator, "Blockchain-based Data Protection Platform for Digital Manufacturing Services (DMS)", National Additive Manufacturing Innovation Cluster, Jul 2018-Nov 2019.
Principal Investigator, "Secure, Fully Functional Digital Mobile Payment System with AI-based Fraud Detection Supporting Offline-Online Transactions", Data Science & Artificial Intelligence Research Grant, Sep 2017-Aug 2019.
Co-Investigator, "Modelling and Optimizing Home Care and Care-giving Services For The Elderly", Care-at-Home Innovation Grant under National Innovation Challenge on Active and Confident Ageing Ministry of Health National Innovation Challenge Programme Office, Jul 2016-Jul 2019.
Principal Investigator, "Data Intelligence for Air Traffic Management", Air Traffic Management Research Institute, Oct 2016-Dec 2017.
Principal Investigator, "A Study of Cyber-security Threats to Traffic Management Systems of Unmanned Aircraft Systems", Air Traffic Management Research Institute, May 2016-Nov 2016.
Principal Investigator, "Research and Development in Mobile Phone Security III", CSIT Project, Jun 2015-Jun 2017.
Principal Investigator, "Research on Integrated Analysis for Cyber-Physical Security", Industry Grant, Sep 2015-Sep 2016.
Co-investigator, "A Computer-based Decision Support System for Predictive HSSE Risk Management in Shipping and Ship Management Companies," SMI Project, Dec 2014-Dec 2017.
Principal Investigator, "Privacy-preserving Database Systems on Untrusted Servers," Tier 1 Project, Nov 2014-Nov 2016.
Principal Investigator, "Research and Development in Mobile Phone Security II", CSIT Project, Mar 2013-Mar 2015.
Principal Investigator, "Countering Distributed Denial of Service Attacks using Self-organizing Fast-flux Swarm Network", DIRP Project, Jul 2012-Jul 2015.
Principal Investigator, Cyber Security Flagship Initiative, College of Engineering, 2012-2013.
Principal Investigator, Secure Cyberspace Platform for Virtual Sustainable Campus with Real-time Continuum - Phase One, Sustainable Earth Office, Dec 2011-Mar 2013.
Collaborator, Advanced Techniques for Handling Imbalanced and Unlabelled Data for Classification, A*STAR SERC Grant, Feb 2011-Jan 2013.
Co-Investigator, pCloud: Privacy in Data Value Chains using Peer-to-Peer Primitives, A*STAR SERC Grant No. 102 158 0038, Aug 2010-Jul 2013.
"I learned that courage was not the absence of fear, but the triumph over it. The brave man is not he who does not feel afraid, but he who conquers that fear." - Nelson Mandela
Ph.D. Theses
Ong J. B., Tensor Computing for Big Data Analytics
Huynh N. A., Frequency Analysis and Online Learning in Malware Detection
Do H. G., Privacy Preserving Query Processing on Outsourced Data via Secure Multiparty Computation
R. D. Shivkumar, Monetization Potential of User Information
V. Sidorov, Privacy-Preserving OLTP Database Systems with OLAP Support
Liu F., Secure Data Mining of Outsourced Data
Tran H. D., Speeding Up Privacy Preserving Data Mining Techniques
Lua R. P., Autonomous Swarm Networks for Auto-reconfiguration against DDoS Attacks
V. Balachandran, Software Protection through Obfuscation
Ang H. H., Distributed Classification in P2P Networks
Nguyen H. L., Advanced Classification for Streaming Time series and Data Streams
Zha W., Power-aware Routing in Wireless Sensor Networks
Li S. K., Outlier Detection
Wang L., Constraint Satisfaction Approach to Product Configuration with Cost Estimation
Zhu L. H., Efficient Methods for Querying and Mining Real-World Graph Data
Han S. H., Privacy-Preserving Data Mining via Secure Multiparty Computation
Dang X. H., Approximation Algorithms for Mining Patterns from Data Streams
Li W. Y., Mining High-dimensional and Graph Data Using Spectral Analysis
Liu Z. H., Semi-Automatic Wrapper Generation for Web Information Extraction
Li Z., Information Concierge for the World Wide Web
Khin M. W., NextDB: Native XML Database System
Woon Y. K., Support-Ordered Trie for Accelerating Association Rule Mining, Web Usage Mining and Clustering
Ong K. L., Enhancements to Knowledge Discovery for Effective Business Objectives
Liu H. F., Timely Refresh of Data-Intensive Website
S. Bhowmick, WHOM: A Data Model and Algebra for a Web Warehous
"A man is but the product of his thoughts what he thinks, he becomes." - Mahatma Gandhi
Conferences / Workshops
Senior Program Committee Member, 26th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2022), Chengu, China, May 2022.
Technical Program Committee Co-chair, 5th International Conference on Big Data and Internet of Things (BDIOT2021), Singapore, Aug 2021.
Senior Program Committee Member, 25th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2021), India, April 2021.
Technical Program Committee Co-chair, 4th International Conference on Big Data and Internet of Things (BDIOT2020), Singapore, Aug 2020.
Senior Program Committee Member, 23th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2019), Macau, China, April 2019.
Senior Program Committee Member, 22th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2018), Melbourne, Australia, May 2018.
Conference Chair, International Conference for Top and Emerging Computer Scientists (IC-TECS), Taipei, Taiwan, Dec 2018.
Senior Program Committee Member, 21th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2017), Jeju, South Korea, May 2017.
Senior Program Committee Member, 20th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2016), Auckland, New Zealand, Apr 2016.
General Chair, 18th International Conference on Information and Communications Security, Singapore, Dec 2016.
Senior Program Committee Member, 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2015), Vietnam, May 2015.
Senior Program Committee Member, 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2014), Tainan, Taiwan, May 2014.
Senior Program Committee Member, 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2013), Gold Coast, Australia, Apr 2013.
International Advisory Committee Member, 7th International Conference on Knowledge Information and Creativity Support Systems (KICSS2012), Melbourne, Australia, Nov 2012.
Senior Program Committee Member, 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2012), Kuala Lumpur, Malaysia, Jun 2012.
Program Vice Chair, 11th Pacific Rim International Conference on Artificial Intelligence (PRICAI2010), Daegu, Korea, Sep 2010.
Program Co-chair, International Mobile Technologies in Enterprise and Social Computing Workshop, held in conjunction with ACM Mobility Conference, Singapore, Oct 18–21, 2010.
Program Committee Vice Chair, 11th Pacific Rim International Conference Artificial Intelligence (PRICAI’10), Daegu, Korea, 2010.
Program Co-chair, Mobile Technology in Enterprise Computing Systems Workshop, held in conjunction with 13th IEEE EDOC Conference, Auckland, New Zealand, Sep 1–4, 2009.
Asia Pacific Liaison Chair, 7th IFIP WG6.11 Conference on e-Commerce, e-Business, and e-Government (I3E), Tokyo, 2008.
Program Vice Chair, 10th Pacific Rim International Conference on Artificial Intelligence (PRICAI2008), Hanoi, Vietnam, Dec 2008.
Area Chair, 12th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD'08), Osaka, Japan, 20-23 May 2008.
"Every man must decide whether he will walk in the light of creative altruism or in the darkness of destructive selfishness." - Martin Luther King, Jr.