Lam Kwok Yan (2) e

 

LAM, Kwok Yan

BSc London, PhD Cambridge

 

Associate Vice President (Strategy and Partnerships), President’s Office

Professor, School of Computer Science and Engineering

Nanyang Technological University,

Singapore

 

Email: kwokyan.lam@ntu.edu.sg

 

Professor Lam is the Associate Vice President (Strategy and Partnerships) and Professor in the School of Computer Science and Engineering at the Nanyang Technological University (NTU), Singapore. He is currently also the Executive Director of the National Centre for Research in Digital Trust (DTC), Director of the Strategic Centre for Research in Privacy-Preserving Technologies and Systems (SCRiPTS), and Director of NTU’s SPIRIT Smart Nation Research Centre. From August 2020 to August 2023, Professor Lam was also on part-time secondment to the INTERPOL as a Consultant at Cyber and New Technology Innovation. He served as the Director of the Nanyang Technopreneurship Center 2019-2022, and as Program Chair (Secure Community) of the Graduate College at NTU 2017-2019. Professor Lam has been a Professor of the Tsinghua University, PR China (2002-2010) and a faculty member of the National University of Singapore and the University of London since 1990. He was a visiting scientist at the Isaac Newton Institute of the Cambridge University and a visiting professor at the European Institute for Systems Security. In 2018, Professor Lam founded TAU Express Pte Ltd, an NTU start-up which specializes in AI and Data Analytics technologies for Smart Cities applications. TAU is a spin-off of the Intelligent Case Retrieval System project, a collaboration between NTU and the Singapore Supreme Court. In 1997, he founded PrivyLink International Ltd, a spin-off company of the National University of Singapore, specializing in e-security technologies for homeland security and financial systems. In 2012, he co-founded Soda Pte Ltd which won the Most Innovative Start Up Award at the RSA 2015 Conference. In 1998, he received the Singapore Foundation Award from the Japanese Chamber of Commerce and Industry in recognition of his R&D achievement in Information Security in Singapore.  Prof Lam received his B.Sc. (First Class Honours) from the University of London in 1987 and his Ph.D. from the University of Cambridge in 1990. His research interests include Distributed Systems, IoT Security Infrastructure and Cyber-Physical System Security, Distributed Protocols for Blockchain, Biometric Cryptography, Quantum Computing, Homeland Security and Cybersecurity. In 2020, he authored a Technical Report on the “Application of Quantum Computers for Law Enforcement and Security Communications” for a Singapore Government ministry. Professor Lam is the recipient of the 2022 Singapore Cybersecurity Hall of Fame Award.

Latest News

·       Special Issue on “Cognitive and Intelligent Internet-of-Things for 5G-Enabled Smart City”, IEEE Wireless Communications (CFP Deadline for manuscripts submission January 15, 2021 - Closed).

·       Special Issue on “Advances and Challenges in Satellite-Based Industrial Internet-of-Things”, IEEE Transactions on Industrial Informatics (CFP Deadline for manuscripts submission extended to January 31, 2020 - Closed).

Current and Past Appointments

·       2022- , Associate Vice President (Strategy and Partnerships), President’s Office, NTU

·       2022-, Executive Director, National Centre for Research in Digital Trust (DTC)

·       2020-2023 , Consultant on Cyber and New Technologies, INTERPOL

·       2015- , Professor, School of Computer Science & Engineering, NTU

·       2019-2022 , Director, Nanyang Technopreneurship Center, NTU

·       2002-2010, Professor, School of Software, Tsinghua University, China

·       1997-2002, Associate Professor, National University of Singapore

·       1995-1997, Senior Lecturer, National University of Singapore

·       1992-1995, Lecturer, National University of Singapore

·       1990-1992, Lecturer, Royal Holloway, University of London

Education

·       1987-1990, Ph.D., Computer Laboratory, University of Cambridge, U.K.

·       1984-1987, B.Sc. in Computer Science (First Class Honours), University of London, U.K.

Awards and Scholarships

·       Nanyang Award for Innovation & Entrepreneurship, Nanyang Technological University, 2023.

·       Asia’s Most Influential Scientist Award, Fortune Times, 2022.

·       Singapore Cybersecurity Hall of Fame Award, Association of Information Security Professionals, 2022.

·       SPRING Singapore Merit Award, SPRING Singapore, 2016

·       Most Innovative Start-Up Award, RSA Conference, 2015

·       Singapore Foundation Award (Research & Development), Japanese Chamber of Commerce and Industry, 1995

·       Cambridge Hong Kong Scholarship, Cambridge Commonwealth Trust, 1987-1990

·       Overseas Research Student Award, British Government, 1987-1990

Selected Professional Activities

·       Associate Editor, IEEE Transactions on Information Forensics and Security, March 2024 -.

·       Associate Editor, IEEE Transactions on Dependable and Secure Computing, December 2023 -.

·       Coach (Future of Policing and Criminal Investigations), 2nd INTERPOL Young Global Police Leaders Programme (YGPLP), Dubai, United Arab Emirates, 13-17 March 2022.

·       Steering Committee Member, National Satellite of Excellence (NSoE) Steering Committee in Design Science & Technology for Secure Critical Infrastructure (DeST-SCI), Singapore University of Technology and Design, 1 July 2019 – 30 June 2022.

·       Independent Reviewer, Dutch Research Council (NWO), August 2019.

·       External Reviewer, Research Grants Council (RGC) of Hong Kong, February 2019.

·       Guest Editor, IEEE Wireless Communications (Special Issue on “Cognitive and Intelligent Internet-of-Things for 5G-Enabled Smart City”), 2020-2021.

·       Guest Editor, IEEE Transactions on Industrial Informatics (Special Issue on “Advances and Challenges in Satellite-Based Industrial Internet-of-Things”), 2019-2020.

·       Chair, Cyber Security WG, SDE Technology Roadmap, Infocomm and Media Development Authority, Singapore, 2018 – 2019

·       Technical Committee Member, SDE Technology Roadmap, Infocomm and Media Development Authority, Singapore, 2018 – 2019

·       Reviewer for Journal, Nature

·       Reviewer for ACM Computing Surveys

·       Reviewer for IEEE Transactions on Communications

·       Reviewer for IEEE Systems Journal

·       Reviewer for IEEE Wireless Communications Magazine

·       Reviewer for IEEE Network Magazine

·       Reviewer for IEEE Computer Magazine

·       Reviewer for IEEE Internet of Things Journal

·       Reviewer for IEEE Access

·       Reviewer for IEEE Transactions on Circuits and Systems for Video Technology

·       Reviewer for IEEE Transactions on Aerospace and Electronic Systems

·       Reviewer for IEEE Transactions on Cognitive Communications and Networking

·       Reviewer for IEEE Journal of Emerging and Selected Topics in Power Electronics

·       Reviewer for IEEE Transactions on Industrial Informatics

·       Reviewer for IEEE Transactions on Vehicular Technology

·       Reviewer for IEEE Transactions on Intelligent Transportation Systems

·       Reviewer for IET Radar, Sonar and Navigation

·       Reviewer for Journal of Parallel and Distributed Computing

·       Reviewer for Journal, Computers and Security

·       Reviewer for International Journal of Critical Infrastructure Protection

·       External Examiner for Master of Data Science, The University of Hong Kong, 2019-2020.

·       External Examiner for Bachelor of Computer Science (Cyber Security) (Hons.) Programme, College of Computer Science and Information Technology, Universiti Tenaga Nasional (UNITEN, Malaysia, January 2018 – December 2019

·       External Reviewer, Singapore Ministry of Education (MOE) Innovation Fund Evaluation Panel (IFEP), August 2017

Recent and Selected Projects

·       Principal Investigator, Spectrum Optimization and Mobility Management for LEO Satellite Internet-of-Things ($988,000), Funded by SUTD Future Communications Research & Development Programme (FCP), November 2022 – April 2025.

·       Lead Principal Investigator, National Centre for Research in Digital Trust, funded by Infocomm and Media Development Authority (S$50,000,000), October 2022 – September 2027.

·       Lead Principal Investigator, Strategic Centre for Research in Privacy-Preserving Technologies & Systems, top-up funding by Infocomm and Media Development Authority (S$5,300,000), April 2021 – March 2025.

·       Lead Principal Investigator, TRANS Lab SPIRIT Phase 2, Translational R&D for Application to Smart Nation & Digital Government ($12,000,000), April 2021-March 2025.

·       Principal Investigator, Smart Nation Internet-of-Things System Threat Analytics, funded by Cyber Security Agency of Singapore, Ministry of Communications and Information ($4,467,400), March 2021 – March 2024.

·       Lead Principal Investigator, Strategic Centre for Research in Privacy-Preserving Technologies & Systems, funded by Infocomm and Media Development Authority (S$10,000,000), November 2018 – October 2023.

·       Principal Investigator, Smart Nation IoT Security Reference Architecture Study, funded by Cyber Security Agency of Singapore, Ministry of Communications and Information (S$780,000), May 2018 – December 2020.

·       Co-Lead Principal Investigator, Risk Assessment for Industrial Control Systems, National Cybersecurity R&D (NCR) Grant Call 2016, funded by National Research Foundation (S$1,211,520), October 2017 – September 2019.

·       Co-Lead Principal Investigator, Cybersecurity Protocol and Mechanism for e-Logistics of Dangerous Goods Tracking Using Blockchain, National Cybersecurity R&D (NCR) Grant Call 2016, funded by National Research Foundation (S$989,280), September 2017 – August 2019.

·       Principal Investigator, ExPReSS: Extensible Platform for Retrieval and Summarization Support, NTUITIVE GAP FUND GRANT (S$250,000), July 2017 – March 2019.

·       Lead Principal Investigator, Smart Platform Infrastructure Research on Integrative Technologies (SPIRIT), Translational R&D for Application to Smart Nation, funded by National Research Foundation (S$11,000,000), September 2016 – March 2021.

Recent and Selected Papers

Journal

1.     R. Liu, W. Zhou, T. Zhang, K. Chen, J. Zhao and K.Y. Lam. “Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models”, IEEE Transactions on Information Forensics & Security, IEEE. https://doi.org10.1109/TIFS.2024.3390609.

2.     D. Wang, Y. Cao, K.Y. Lam, Y. Hu, O. Kaiwartya. “Authentication and Key Agreement Based on Three Factors and PUF for UAVs-assisted Post-disaster Emergency Communication”, IEEE Internet of Things Journal, IEEE. http://doi.org/10.1109/JIOT.2024.3371101.

3.     T. Zhang, K.Y. Lam and J. Zhao. “Device Scheduling and Assignment in Hierarchical Federated Learning for Internet of Things”, IEEE Internet of Things Journal, IEEE. https://doi.org/10.1109/JIOT.2024.3362972.

4.     Z. Liu, J. Guo, W. Yang, J. Fan, K.Y. Lam and J. Zhao. “Dynamic User Clustering for Efficient and Privacy-Preserving Federated Learning”, IEEE Transactions on Dependable and Secure Computing, IEEE. https://doi.org/10.1109/TDSC.2024.3355458.

5.     K.Y. Lam, X. Lu, L. Zhang, X. Wang, H. Wang and S.Q. Goh. “Efficient FHE-based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service”, IEEE Transactions on Dependable and Secure Computing, IEEE. https://doi.org/10.1109/TDSC.2024.3353536.

6.     M. Yang, T. Guo, T. Zhu, I. Tjuawinata, J. Zhao and K.Y. Lam. “Local differential privacy and its applications: A comprehensive survey”, Computer Standards & Interfaces. Elsevier, Vol. 89, 2024, 103827. https://doi.org/10.1016/j.csi.2023.103827.

7.     L. Zhang, X. Wang, J. Wang, R. Pung, H. Wang and K.Y. Lam. “An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMTs Data Protection With Its Application to Pandemic Modelling”, IEEE Internet of Things Journal, IEEE. https://doi.org/10.1109/JIOT.2023.3348122.

8.     H. Ma, S. Huang, J. Guo, K.Y. Lam and T. Yang. “Blockchain-Based Privacy-Preserving Federated Learning for Mobile Crowdsourcing”, IEEE Internet of Things Journal, IEEE, vol. 11, no. 8, pp. 13884-13899, 15 April 2024. https://doi.org/10.1109/JIOT.2023.3340630.

9.     J. Fan, M. Xu, J. Guo, L.K. Shar, J. Kang, D. Niyato and K.Y. Lam. “Decentralized Multimedia Data Sharing in IoV: A Learning-based Equilibrium of Supply and Demand”, IEEE Transactions on Vehicular Technology, IEEE, Vol. 73, Issue 3, pp. 4035-4050, March 2024, DOI: 10.1109/TVT.2023.3322270.

10.  B. Huang, D. Chaki, A. Bouguettaya and K.Y. Lam. “A Survey on Conflict Detection in IoT-based Smart Homes”, ACM Computing Surveys, ACM, Vol. 56, Issue 5, pp. 1-40, November 2023. https://doi.org/10.1145/3629517.

11.  H. Yang, S. Zhang, A. Alphones, C. Chen, K.Y. Lam, Z. Xiong, L. Xiao and Y. Zhang. “An Advanced Integrated Visible Light Communication and Localization System”, IEEE Transactions on Communications, IEEE, DOI: 10.1109/TCOMM.2023.3309823.

12.  P. Si, L. Qian, J. Zhao and K.Y. Lam. “A Hybrid Framework of Reinforcement Learning and Convex Optimization for UAV-Based Autonomous Metaverse Data Collection”, IEEE Network. Accepted.

13.  K.L. Tan, C.H. Chi and K.Y. Lam. “Survey on Digital Sovereignty and Identity: From Digitization to Digitalization”, ACM Computing Surveys, ACM, Vol. 56, Issue 3, pp. 1-36, October 2023. https://doi.org/10.1145/3616400.

14.  S. Zhang, K.Y. Lam, B. Shen, L. Wang and F. Li. “Dynamic Spectrum Access for Internet-of-Things with Hierarchical Federated Deep Reinforcement Learning”, Ad Hoc Networks, Elsevier. DOI: https://doi.org/10.1016/j.adhoc.2023.103257.

15.  T. Zhang, K.Y. Lam, J. Zhao and J. Feng. “Joint Device Scheduling and Bandwidth Allocation for Federated Learning over Wireless Networks”, IEEE Transactions on Wireless Communications, IEEE, DOI: 10.1109/TWC.2023.3291701.

16.  F. Li, S. Zhang, K.Y. Lam, X. Liu and L. Wang. “Dynamic Spectrum Optimization for Internet-of-Things with Social Distance Model”, Wireless Network, Springer US, DOI: 10.1007/s11276-023-03358-w.

17.  T. Zhang, K.Y. Lam and J. Zhao. “Deep reinforcement learning based scheduling strategy for federated learning in sensor-cloud systems”, Future Generation Computer Systems, 2023, Elsevier, DOI: https://doi.org/10.1016/j.future.2023.03.009.

18.  J. Fan, W. Yang, Z. Liu, J. Kang, D. Niyato, K.Y. Lam, H. Du. “Understanding Security in Smart City Domains From the ANT-centric Perspective”, IEEE Internet of Things Journal, IEEE, Vol. 10, Issue 13, pp. 11199-11223, July 2023, DOI: 10.1109/JIOT.2023.3252040.

19.  Q. Li, X. Wang, Q. Pei, X. Chen and K.Y. Lam. “Consistency preserving database watermarking algorithm for decision trees”, Digital Communications and Networks (2023), Elsevier, DOI: https://doi.org/10.1016/j.dcan.2022.12.015.

20.  M. Yang, I. Tjuawinata, K.Y. Lam, T. Zhu, J. Zhao. “Differentially Private Distributed Frequency Estimation”, IEEE Transactions on Dependable and Secure Computing, IEEE, doi: 10.1109/TDSC.2022.3227654.

21.  T. Zhang, K.Y. Lam, J. Zhao, F. Li, H. Han, N. Jamil. “Enhancing Federated Learning with spectrum allocation optimization and device selection”, IEEE/ACM Transactions on Networking, IEEE, DOI: 10.1109/TNET.2022.3231986.

22.  M. Yang, K.Y. Lam, T. Zhu and C. Tang. “SPoFC: A framework for stream data aggregation with local differential privacy”, Concurrency and Computation: Practice and Experience, Wiley, https://doi.org/10.1002/cpe.7572.

23.  F. Li, L. Sun, K.Y. Lam, S. Zhang, Z. Sun, B. Peng, H. Xu and L. Zhang. “Segmentation of Human Aorta Using 3D nnU-Net-Oriented Deep Learning”, Review of Scientific Instruments, AIP Publishing, DOI: 10.1063/5.0084433.

24.  F. Li, Z. Sun, K.Y. Lam, S. Zhang, L. Sun and L. Wang. “Reputation-Based Power Allocation for NOMA Cognitive Radio Networks”, Wireless Network, Springer US, DOI: 10.1007/s11276-022-03139-x.

25.  K.L. Tan, C.H. Chi and K.Y. Lam. “Secure and Privacy-Preserving Sharing of Personal Health Records with Multi-Party Pre-Authorization Verification”, Wireless Network, Springer US, 2022, DOI: 10.1007/s11276-022-03114-6.

26.  H. Yang, K.Y. Lam, L. Xiao, Z. Xiong, H. Hu, D. Niyato and H.V. Poor. “Lead Federated Neuromorphic Learning for Wireless Edge Artificial Intelligence”, Nature Communications, Springer, DOI: 10.1038/s41467-022-32020-W (https://www.nature.com/articles/s41467-022-32020-w.pdf).

27.  Z. Liu, J. Guo, W. Yang, J. Fan, K.Y. Lam and J. Zhao. “Privacy-Preserving Aggregation in Federated Learning: A Survey”, IEEE Transactions on Big Data, IEEE, DOI: 10.1109/TBDATA.2022.3190835.

28.  Q. Li, X. Wang, Q. Pei, K.Y. Lam, N. Zhang, M. Dong and V. Leung. “Database Watermarking Algorithm based on Decision Tree Shift Correction”, IEEE Internet of Things Journal, IEEE, Volume 9, Issue 23, pp. 24373-24387, December 2022, DOI:  10.1109/JIOT.2022.3188631.

29.  Y. Sun, H. Xiong, S.M. Yiu and K.Y. Lam. “BitAnalysis: A Visualization System for Bitcoin Wallet Investigation”, IEEE Transactions on Big Data, IEEE, DOI: 10.1109/TBDATA.2022.3188660.

30.  M. Yang, I. Tjuawinata, K.Y. Lam. “K-means clustering with local -privacy for privacy-preserving data analysis”, IEEE Transactions on Information Forensics & Security, IEEE, Vol. 17, pp. 2524-2537, 2022, DOI: 10.1109/TIFS.2022.3189532.

31.  Z. Li, R. Cao, H. Li, K.Y. Lam, Y. Hu and A. Kot. “One-Class Knowledge Distillation for Face Presentation Attack Detection", IEEE Transactions on Information Forensics & Security, IEEE, Vol. 17, pp. 2137-2150, May 2022, DOI:10.1109/TIFS.2022.3178240.

32.  F. Li, B. Shen, J. Guo, K.Y. Lam, G. Wei and L. Wang. “Dynamic Spectrum Access for Internet-of-Things Based on Federated Deep Reinforcement Learning”, IEEE Transactions on Vehicular Technology, IEEE, Volume 71, Issue 7, pp. 7952-7956, DOI: 10.1109/TVT.2022.3166535.

33.  Z. Liu, J. Guo, K.Y. Lam and J. Zhao. “Efficient Dropout-resilient Aggregation for Privacy-preserving Machine Learning”, IEEE Transactions on Information Forensics & Security, IEEE, Vol. 18, pp. 1839-1854, 2023, DOI: 10.1109/TIFS.2022.3163592.

34.  H. Yang, J. Zhao, K.Y. Lam, Z. Xiong, Q. Wu and L. Xiao. “Distributed Deep Reinforcement Learning Based Spectrum and Power Allocation for Heterogeneous Networks”, IEEE Transactions on Wireless Communications, IEEE, March 2022, DOI: 10.1109/TWC.2022.3153175.

35.  Z. Li, H. Li, X. Luo, Y. Hu, K.Y. Lam and A. Kot. “Asymmetric Modality Translation For Face Presentation Attack Detection”, IEEE Transactions on Multimedia, IEEE, October 2021, DOI: 10.1109/TMM.2021.3121140.

36.  J. Li, Y. Li, C. Cao and K.Y. Lam. “Conditional Anonymous Authentication with Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles”, IEEE Internet of Things Journal, IEEE, Volume 9, Issue 11, pp. 8749-8762, June 2022, DOI: 10.1109/JIOT.2021.3116422.

37.  F. Li, K.Y. Lam, Z. Ni, D. Niyato, X. Liu and L. Wang. “Cognitive Carrier Resource Optimization for Internet-of-Vehicles in 5G-Enhanced Smart Cities”, IEEE Network Magazine, IEEE, September 2021, DOI: 10.1109/MNET.211.2100340.

38.  H. Han, J. Zhao, W. Zhai, Z. Xiong, D. Niyato, M.Di Renzo, Q-V. Pham, W. Lu and K.Y. Lam. “Reconfigurable Intelligent Surface Aided Power Control for Physical-Layer Broadcasting”, IEEE Transactions on Communications, IEEE, August 2021, DOI: 10.1109/TCOMM.2021.3104871.

39.  C. Huang, Y. Zhao, H. Chen, X. Wang, Q. Zhang, Y. Chen, H.X. Wang and K.Y. Lam. “zkRep: A Privacy-preserving Scheme for Reputation-based Blockchain System”, IEEE Internet of Things Journal, IEEE, Volume 9, Issue 6, pp. 4330-4342, March 15 2022, DOI: 10.1109/JIOT.2021.3105273.

40.  X. Liu, K.Y. Lam, F. Li, J. Zhao, L. Wang and T.S. Durrani. “Spectrum Sharing for 6G Integrated Satellite-Terrestrial Communication Networks Based on NOMA and CR”, IEEE Network Magazine, IEEE, Volume 35, Issue 4, pp. 28-34, July/August 2021, DOI: 10.1109/MNET.011.2100021.

41.  H. Yang, J. Zhao, Z. Xiong, K.Y. Lam, S. Sun and L. Xiao. “Privacy-Preserving Federated Learning for UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management”, IEEE Journal on Selected Areas in Communications, IEEE, Volume 39, No. 10, pp. 3144-3159, Oct. 2021, DOI: 10.1109/JSAC.2021.3088655.

42.  K.Y. Lam, S. Mitra, F. Gondesen, X. Yi. “ANT-Centric IoT Security Reference Architecture - Security-by-Design for Satellite-Enabled Smart Cities”, IEEE Internet of Things Journal, IEEE, April 2021, DOI: 10.1109/JIOT.2021.3073734.

43.  F Li, K.Y. Lam, Z Sheng, W. Lu, X. Liu and L. Wang. “Agent-Based Spectrum Management Scheme in Satellite Communication Systems”, IEEE Transactions on Vehicular Technology, IEEE, February 2021, DOI: 10.1109/TVT.2021.3059837.

44.  X. Li, L. Cheng, C. Sun, K.Y. Lam, X. Wang and F. Li. “Federated Learning Empowered Collaborative Data Sharing for Vehicular Edge Networks”, IEEE Network Magazine, IEEE, Volume 35, Issue 3, pp. 116-124, May/June 2021, DOI: 10.1109/MNET.011.2000558.

45.  Y. Zhao, J. Zhao, J. Kang, Z. Zhang, D. Niyato, S. Shi and K.Y. Lam. “A Blockchain-Based Approach for Saving and Tracking Differential-Privacy Cost”, IEEE Internet of Things Journal, IEEE, February 2021, DOI: 10.1109/JIOT.2021.3058209.

46.  M. Yang, I. Tjuawinata, K.Y. Lam, J. Zhao and L. Sun. “Secure Hot Path Crowdsourcing with Local Differential Privacy under Fog Computing Architecture”, IEEE Transactions on Services Computing, IEEE, November 2020, DOI:10.1109/TSC.2020.3039336.

47.  Y. Zhao, J. Zhao, M. Yang, T. Wang, N. Wang, L. Lyu, D. Niyato and K.Y. Lam. “Local Differential Privacy based Federated Learning for Internet of Things”, IEEE Internet of Things Journal, IEEE, November 2020, DOI:10.1109/JIOT.2020.3037194.

48.  T. Wang, J. Zhao, Z. Hu, X. Yang, X. Ren and K.Y. Lam. “Local Differential Privacy for Data Collection and Analysis”, Neurocomputing, Elsevier, October 2020, https://doi.org/10.1016/j.neucom.2020.09.073.

49.  M.B. Mollah, J. Zhao, D. Niyato, Y.L. Guan, C. Yuen, S. Sun, K.Y. Lam and L.H. Koh. “Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey”, IEEE Internet of Things Journal, IEEE, Volume 8, Issue 6, pp. 4157 – 4185, March 2021, DOI: 10.1109/JIOT.2020.3028368.

50.  A. Chattopadhyay, K.Y. Lam and Y. Tavva. “Autonomous Vehicle: Security by Design”, IEEE Transactions on Intelligent Transportation Systems, IEEE, Vol. 22, No. 11, pp. 7015-7029, November 2021, DOI: 10.1109/TITS.2020.3000797.

51.  L. Wang, K.Y. Lam, X. Liu and F. Li. “Resource Allocation in Satellite-Based Internet of Things Using Pattern Search Method”, IEEE Access, IEEE, Volume 8, pp. 110908 – 110914, 2020, DOI: 10.1109/ACCESS.2020.3002834.

52.  K.Y. Lam and C. Wilson. “Developing AI for Law Enforcement in Singapore and Australia”, Communications of the ACM, ACM, 63(4), pp62, April 2020, DOI: 10.1145/3378418.

53.  M. B. Mollah, J. Zhao, D. Niyato, K.Y. Lam, X. Zhang, A. Ghias, L.H. Koh, L. Yang. “Blockchain for Future Smart Grid: A Comprehensive Survey”, IEEE Internet of Things Journal, IEEE, DOI: 10.1109/JIOT.2020.2993601.

54.  H.Y. Ma, E. Huang and K.Y. Lam. “Blockchain-based mechanism for fine-grained authorization in data crowdsourcing”, Future Generation Computer Systems, Elsevier, 106 (2020), pp. 121–134, https://doi.org/10.1016/j.future.2019.12.037.

55.  F. Li, K.Y. Lam, X. Li, Z. Sheng and L. Wang. “Advances and Emerging Challenges in Cognitive Internet-of-Things”, IEEE Transactions on Industrial Informatics, IEEE, November 2019, DOI: 10.1109/TII.2019.2953246.

56.  X. Wang, Z. Na, K.Y. Lam, X. Liu, Z. Gao, F. Li and L. Wang. “Energy Efficiency Optimization for NOMA-Based Cognitive Radio With Energy Harvesting”, IEEE Access, IEEE, doi: 10.1109/ACCESS.2019.2940698, Volume 7, pp. 139172 – 139180, 2019.

57.  F. Li, K.Y. Lam, L. Meng and L. Wang. “Trading-Based Dynamic Spectrum Access and Allocation in Cognitive Internet of Things”, IEEE Access, IEEE, Volume 7, pp. 125952 – 125959, doi: 10.1109/ACCESS.2019.2937582.

58.  F. Li, K.Y. Lam, H.W. Chen, N. Zhao. “Spectral Efficiency Enhancement in Satellite Mobile Communications: A Game-Theoretical Approach”, IEEE Wireless Communications, IEEE, doi: 10.1109/MWC.001.1900160, 15 October 2019.

59.  F. Li, K.Y. Lam, K. Zhao, M. Jia, X. Li and L. Wang. “Spectrum Optimization for Satellite Communication Systems with Heterogeneous User Preferences”, IEEE Systems Journal, IEEE, doi: 10.1109/JSYST.2019.2910230, 26 April 2019.

60.  X. Yi, E. Bertino, F.Y. Rao, K.Y. Lam, S. Nepal and A. Bouguettaya. “Privacy-Preserving User Profile Matching in Social Networks”, IEEE Transactions on Knowledge and Data Engineering, IEEE, doi: 10.1109/TKDE.2019.2912748, 23 April 2019.

61.  X. Yi, Z. Tari, F. Hao, L.Q. Chen, J. Liu, K.Y. Lam, X.C., Yang, I. Khalil, A. Zomaya, “Efficient Threshold Password-Authenticated Secret Sharing Protocols for Cloud Computing”, Journal of Parallel and Distributed Computing, Springer, https://doi.org/10.1016/j.jpdc.2019.01.013, 15 February 2019.

62.  S. Badsha, X. Yi, I. Khalil, S. Nepal, D. Liu and K.Y. Lam. “Privacy Preserving User based Web Service Recommendations”, IEEE Access, IEEE, Volume 6, Issue 1, December, 2018, DOI 10.1109/ACCESS.2018.2871447.

63.  L. Wang, K.Y. Lam, M. Xiong, F. Li, X. Liu and J. Wang. “Spectrum Pricing for Cognitive Radio Networks with User's Stochastic Distribution”, Wireless Networks, Springer US, 16 July 2018, https://doi.org/10.1007/s11276-018-1799-8.

64.  F. Li, K.Y. Lam, J.Y. Hua, K Zhao, N. Zhao and L. Wang. “Improving Spectrum Management for Satellite Communication Systems with Hunger Marketing”, IEEE Wireless Communications Letters, IEEE, 17 January 2019, Doi: 10.1109/LWC.2019.2893659.

65.  F. Li, K.Y. Lam, Z. Sheng, X. Zhang, K. Zhao and L. Wang. “Q-Learning-Based Dynamic Spectrum Access in Cognitive Industrial Internet of Things”, Wireless Networks and Applications, Springer US, 11 September 2018, DOI 10.1007/s11036-018-1109-9.

66.  L. Wang, K.Y. Lam, M. Xiong, F. Li, X. Liu and J. Wang. “Spectrum Pricing for Cognitive Radio Networks with User's Stochastic Distribution”, Wireless Networks, Springer US, 16 July 2018, https://doi.org/10.1007/s11276-018-1799-8.

67.  F. Li, K.Y. Lam, N. Zhao, X. Liu, K. Zhao, and L. Wang. “Spectrum Trading for Satellite Communication Systems with Dynamic Bargaining,” IEEE Transactions on Communications, IEEE, Volume 66, Issue 10, pp. 4680 – 4693, Oct 2018, Doi: 10.1109/TCOMM.2018.2837909.

68.  S. Badsha, X. Yi, I. Khalil, D. Liu, S. Nepal, E. Bertino and K.Y. Lam. “Privacy Preserving Location-Aware Personalized Web Service Recommendations”, IEEE Transactions on Services Computing, 22 May 2018, Doi: 10.1109/TSC.2018.2839587.

69.  F. Li, K.Y. Lam, X. Li, X. Liu, L. Wang and C.M. Leung. “Dynamic Spectrum Access Networks with Heterogeneous Users: How to Price the Spectrum?”, IEEE Transactions on Vehicular Technology, IEEE, Volume 67, Issue 6, pp 5203 – 5216, June 2018, Doi10.1109/TVT.2018.2818749.

70.  F. Li, K.Y. Lam, L. Wang, Z. Na, X. Liu and Q. Pan. “Caching Efficiency Enhancement at Wireless Edges with Concerns on User's Quality of Experience”, Wireless Communications and Mobile Computing, Vol. 2018, Article ID 1680641, 10 pages, 2018. Doi:10.1155/2018/1680641.

71.  F. Li, K.Y. Lam and L. Wang. “Power allocation in cognitive radio networks over Rayleigh-fading channels with hybrid intelligent algorithms”, Wireless Networks, Volume 24, Issue 7, pp. 2397 – 2407, Oct 2018. Doi:10.1007/s11276-017-1476-3.

72.  F. Li, X. Liu, K.Y. Lam, Z. Na, J. Hua, J. Wang and L. Wang. “Spectrum Allocation with Asymmetric Monopoly Model for Multibeam-Based Cognitive Satellite Networks”, IEEE Access, IEEE, Volume 6, Issue 1, pp. 9713 – 9722, 2018. Doi: 10.1109/ACCESS.2018.2797278.

73.  A. Burg and A. Chattopadhyay and K.Y. Lam. “Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things”, Proceedings of the IEEE, IEEE, Volume: 106, Issue: 1, pp. 38 – 60, Jan. 2018. Doi: 10.1109/JPROC.2017.2780172.

74.  L. Wang, F. Li, X. Liu, K.Y. Lam, Z. Na and H. Peng. “Spectrum Optimization for Cognitive Satellite Communications with Cournot Game Model”, IEEE Access, IEEE, Volume 6, Issue 1, pp. 1624 – 1634, 2018. Doi: 10.1109/ACCESS.2017.2779804.

75.  F. Li, K.Y. Lam, J. Wang, X. Liu, K. Zhao and L. Wang. “Joint Pricing and Power Allocation for Multibeam Satellite Systems with Dynamic Game Model”, IEEE Transactions on Vehicular Technology, IEEE, Volume 67, Issue 3, pp. 2398 – 2408, March 2018. Doi: 10.1109/TVT.2017.2771770.

76.  P. Vikramkumar, A. Chattopadhyay and K.Y. Lam. “Secure and Lightweight Compressive Sensing using Stream Cipher”, IEEE Transactions on Circuits and Systems II, IEEE, Volume 65, Issue 3, pp. 371-375, March 2018. Doi: 10.1109/TCSII.2017.2715659.

 

 

Conference

1.     T. Guo, S. Peng, Z. Zhang, M. Yang and K.Y. Lam. “Improving the accuracy of locally differentially private community detection by order-consistent data perturbation”, The 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 14-18 July, 2024 in Washington D.C., USA. Accepted.

2.     J. Wang, Z. Liu, J. Nie, Y. Qi, C.H. Chi, K.Y. Lam. “Object-level Copy-Move Forgery Image Detection based on Inconsistency Mining”, The Web Conference 2024, 13-17 May, 2024, Singapore. Accepted.

3.     F. Li, W. Nie, K.Y. Lam, B. Shen and X. Li. “Network Traffic Prediction Using PSO-LightGBM-TM”, IEILM 2024: IEEE INFOCOM 2024 Workshop on Integrating Edge Intelligence and Large Model in Next Generation Networks, May 20, 2024, Vancouver, Canada. Accepted.

4.     J. Shen, W. Yang, Z. Chu, J, Fan, D. Niyato and K.Y. Lam. “Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning”, 2024 IEEE International Conference on Communications (ICC): Communication and Information System Security Symposium, 9-13 June 2024, Denver, CO, USA. Accepted.

5.     R. Liu, W. Zhou, S. Wu, J. Zhao and K.Y. Lam. “SSTA: Salient Spatially Transformed Attack”, The 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2024), 14-10 April 2024, Seoul, Korea, pp. 5910-5914, https://doi.org/10.1109/ICASSP48485.2024.10447882.

6.     Y. He, F. Peng, M. Long and K.Y. Lam. “Causality-Inspired Single-Source Domain Generalization for Face Anti-Spoofing”, The 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2024), 14-10 April 2024, Seoul, Korea, pp. 4925-4929, https://doi.org/10.1109/ICASSP48485.2024.10447694.

7.     S. Li, M. Ge, R. Feng, X. Li, and K.Y. Lam. “Automatic Detection and Analysis towards Malicious Behavior in IoT Malware”, Machine Learning for Cybersecurity Workshop (MLC), The 23rd IEEE International Conference on Data Mining (ICDM'23), 1-4 December, Shanghai, China, 2023, pp. 1332-1341, IEEE. https://doi.org/10.1109/ICDMW60847.2023.00171.

8.     V. Sachidananda, B. Chai, F. Gondesen, K.Y. Lam and Yang Liu. “Honey-Gauge: Enabling User-Centric Honeypot Classification”, The 3rd International Conference on Ubiquitous Security 2023 (UbiSec-2023), 1-3 November 2023, Exeter, UK, Communications in Computer and Information Science, Vol 2034. Springer, Singapore. https://doi.org/10.1007/978-981-97-1274-8_8.

9.     V. Sachidananda, S. Muneeswaran, Y. Liu and K.Y. Lam. “Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments”, The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023), 1-3 Nov 2023, Exeter, UK. Accepted.

10.  V. Sachidananda, B. Teo, R. Feng, K.Y. Lam and L. Yang, “FOCUS: Fatigue-Reducing IOCs Through Prioritization and Scoring,” 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC/PiCom/CBDCom/CyberSciTech), Abu Dhabi, United Arab Emirates, 2023, pp. 0020-0027, https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361355.

11.  V. Sachidananda, A. Sachdeva, R. Patil, K.Y. Lam and Y. Liu. “APTer: Towards the Investigation of APT Attribution”, The 2023 6th IEEE Conference on Dependable and Secure Computing (IEEE DCS 2023), November 7-9, 2023, Tampa, FL, USA. Accepted.

12.  J. Fan, M. Xu, Z. Liu, H. Ye, C. Gu, D. Niyato and K.Y. Lam. “A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles”, The 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), 10-13 October 2023, Hong Kong. https://doi.org/10.1109/VTC2023-Fall60731.2023.10333689.

13.  G. Zeng, J. Lai, Z. Huang, L. Zhang, X. Wang, K.Y. Lam, H. Wang and J. Weng. “Non-Interactive Zero-Knowledge Functional Proofs”, 2023 International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023), December 4-8, 2023, Guangzhou, China. LLNCS 14442, pp. 236–268, Springer. https://doi.org/10.1007/978-981-99-8733-7_8.

14.  P. Si, J. Zhao, K.Y. Lam and Q. Yang. “UAV-assisted Semantic Communication with Hybrid Action Reinforcement Learning”, The 2023 IEEE Global Communications Conference: : Next-Generation Networking and Internet (GLOBECOM 2022), December 4 – 8, 2023, Kuala Lumpur, Malaysia, pp 3801-3806, https://doi.org/10.1109/GLOBECOM54140.2023.10437643.

15.  R. Liu, J. Zhang, K.Y. Lam, J. Zhao and W. Zhou. “SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack”, The 2023 International Conference on Neural Information Processing (ICONIP2023), November 20-23, 2023, Changsha, China, LNCS 14451, pp 370-382, Springer. https://doi.org/10.1007/978-981-99-8073-4_29.

16.  N. Lee, U. Vasanthakumar, R. Chen, C. Lee, K.Y. Lam, S.C. Hui, R. Kow, B. Er, F.M. Tarmidzi and K.T. Aung. “Predictive Food Safety Risk Monitoring”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291540.

17.  U. Vasanthakumar, J.R.B. Goh, S.C. Hui, K.Y. Lam, B. Er, F.M. Tarmidzi and K.T. Aung. “Fine-tuning Pre-trained Language Model for Urgency Classification on Food Safety Feedback”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291215.

18.  I. Tjuawinata, Y. Zhao, B. Shen, K.Y. Lam and C.H. Chi. “Search and Permission Request over Encrypted Database”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291415.

19.  A. Gunawan, I. Tjuawinata, K.Y. Lam, C.H. Chi. “Decentralized Data Sharing using Searchable Encryption Database with Selective Data Retrieval”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291467.

20.  T. Zhang, K.Y. Lam and J. Zhao. “Device Scheduling and Bandwidth Allocation for Federated Learning over Wireless Networks”, The 10th International Conference on ICT for Smart Society 2023 (ICISS 2023), September 6-7, 2023, Bandung, Indonesia. https://doi.org/10.1109/ICISS59129.2023.10291589.

21.  V. Sachidananda, R. Patil, H. Peng, Y. Liu and K.Y. Lam. “ThreatLand: Extracting Intelligence from Audit Logs via NLP methods”, The 20th International Conference on Privacy, Security, and Trust (PST 2023), 21-23 August 2023, Copenhagen, Denmark, Accepted.

22.  C. Chen, Y. Wang, Y. Zhang, Q.Z. Sheng and K.Y. Lam. “Separate-and-Aggregate: A Transformer-based Patch Refinement Model for Knowledge Graph Completion”, The 19th International Conference on Advanced Data Mining and Applications (ADMA'23), Shenyang, China, 21-23 August, 2023, Lecture Notes in Computer Science, vol 14177. Springer, Cham. https://doi.org/10.1007/978-3-031-46664-9_5.

23.  K.Y. Lam, V. Cheng and Z.K. Yeong. “Applying Large Language Models for Enhancing Contract Drafting”, 3rd International Workshop on Artificial Intelligence and Intelligent Assistance for Legal Professionals in the Digital Workplace  (LegalAIIA 2023), 19 June 2023, Braga, Portugal, Vol. 3423, pp. 70-80, CEUR Workshop Proceedings. https://ceur-ws.org/Vol-3423/.

24.  C. Chen, Y. Wang, A. Sun, B. Li and K.Y. Lam. “Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge Graph Completion via Conditional Soft Prompting”, The 61st Annual Meeting of the Association for Computational Linguistics (ACL 2023) , July 9-14, 2023, Toronto, Canada, pp 11489–11503, DOI: 10.18653/v1/2023.findings-acl.729.

25.  A. Luqman, A. Chattopadhyay and K.Y. Lam. “Membership Inference Vulnerabilities in Peer to Peer Federated Learning”, The Inaugural AsiaCCS Workshop on Secure and Trustworthy Deep Learning Systems (SecTL 2023), 10 July 2023, Melbourne, Australia, ACM. https://doi.org/10.1145/3591197.3593638.

26.  Z. Liu, J. Guo, M. Yang, W. Yang, J. Fan and K.Y. Lam. “Privacy-Enhanced Knowledge Transfer with Collaborative Split Learning over Teacher Ensembles”, The Inaugural AsiaCCS Workshop on Secure and Trustworthy Deep Learning Systems (SecTL 2023), 10 July 2023, Melbourne, Australia, ACM. https://doi.org/10.1145/3591197.3591303. (Winner of Best Paper Award)

27.  W. Yang, Z. Chu, J. Fan, Z. Liu and K.Y. Lam. “A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security”, 9th ACM Cyber-Physical System Security Workshop (CPSS 2023), 10 July 2023, Melbourne, Australia, ACM. https://doi.org/10.1145/3592538.3594270.

28.  J. Fan, L.K. Shar, J. Guo, W. Yang, D. Niyato, K.Y. Lam. “Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks”, 16th International Conference on Network and System Security (NSS) 2022, December 9-12, 2022, Denarau Island, Fiji, , LNCS 13787, pp 283-304, Springer. https://doi.org/10.1007/978-3-031-23020-2.

29.  Q. Han, J. Zhao and K.Y. Lam. “Facial Landmark Predictions with Applications to Metaverse”, 2022 IEEE 8th World Forum on Internet of Things (WF-IOT 2022), October 26 – November 11, 2022, Yokohama, Japan, Accepted.

30.  B. Huang, B. Zhang and Q.Z. Sheng and K.Y. Lam. “A Multi-task Learning Approach for Predicting Intentions Using Smart Home IoT Services”, The 20th International Conference on Service Oriented Computing (ICSOC), November 29 – 2 December 2022, Sevilla, Spain. In: Troya, J., Medjahed, B., Piattini, M., Yao, L., Fernández, P., Ruiz-Cortés, A. (eds) Service-Oriented Computing. ICSOC 2022. Lecture Notes in Computer Science, vol 13740. Springer, Cham. https://doi.org/10.1007/978-3-031-20984-0_29.

31.  C. Chen, Y. Wang, B. Li and K.Y. Lam. “Knowledge Is Flat: A Seq2Seq Generative Framework for Various Knowledge Graph Completion”, The 29th International Conference on Computational Linguistics (COLING 2022), October 12-17, 2022, Gyeongju, Republic of Korea. pp 4005-4017. https://aclanthology.org/2022.coling-1.352.

32.  P. Si, J. Zhao, H. Han, K.Y. Lam and L. Yang. “Resource Allocation and Resolution Control in the Metaverse with Mobile Augmented Reality”, The 2022 IEEE Global Communications Conference (GLOBECOM 2022), December 4 – 8, 2022, Rio de Janeiro, Brazil, pp. 3265-3271. DOI: 10.1109/GLOBECOM48099.2022.10001548.

33.  T. Zhang, Z. Li, Y. Chen, K.Y. Lam and J. Zhao. “Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised Learning”, The 15th IEEE International Conference on Internet of Things (iThings-2022), August 22-25, 2022, Espoo, Finland, pp. 77-84. DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00050.

34.  H. Yang, K.Y. Lam, J. Nie, J. Zhao, S. Garg, L. Xiao, Z. Xiong and M. Guizani. “3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks”, The Fifth IEEE Workshop on 5G and Beyond Wireless Security (5th Wireless-Sec 2021) held in Conjunction with the 2021 IEEE Global Communications Conference (GLOBECOM 2021), 2021, pp. 1-6, DOI: 10.1109/GCWkshps52748.2021.9681960. (Winner of Best Paper Award).

35.  J. Guo, Z. Liu, K.Y. Lam, J. Zhao and Y. Chen. “Privacy-Enhanced Federated Learning with Weighted Aggregation”, The 7th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2021), November 19-21, 2021, Fuzhou, China. https://doi.org/10.1007/978-981-16-7913-1_7.

36.   H. Yang, J. Zhao, K.Y. Lam, S. Garg, Q. Wu and Z. Xiong. “Deep Reinforcement Learning Based Resource Allocation for Heterogeneous Networks”, The 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2021), 2021, pp. 253-258, DOI: 10.1109/WiMob52687.2021.9606402.

37.  W.Z. Yang and K.Y. Lam. “Effective Anomaly Detection Model Training with Only Unlabeled Data by Weakly Supervised Learning Techniques”, The 23rd International Conference on Information and Communications Security (ICICS 2021), September 17-19, 2021, Chongqing, P.R. China, LNCS, Vol 12918. Springer, Cham. https://doi.org/10.1007/978-3-030-86890-1_23.

38.  H. Yang, J. Zhao, J. Nie, N. Kumar, K.Y. Lam and Z. Xiong, "UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation Based on Asynchronous Reinforcement Learning," IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2021, pp. 1-6, doi: 10.1109/INFOCOMWKSHPS51825.2021.9484604.

39.   Y. Zhao, J. Zhao, W. Zhai, S. Sun, D. Niyato, K.Y. Lam. “A Survey of 6G Wireless Communications: Emerging Technologies”, Future of Information and Communications Conference (FICC) 2021, April 29-30, 2021, Vancouver, Canada. https://doi.org/10.1007/978-3-030-73100-7_12.

40.   H. Yang, Y. Zhao, Z. Xiong, J. Zhao, D. Niyato, K.Y. Lam, Q. Wu. “Deep Reinforcement Learning Based Intelligent Reflecting Surface for Secure Wireless Communications”, GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020, pp. 1-6, doi: 10.1109/GLOBECOM42002.2020.9322615.

41.  Y. Huang, F. Wang, A.W.K. Kong and K.Y. Lam. “New Threats against Object Detector with Non-Local Block”, The 16th European Conference on Computer Vision (ECCV 2020), 23-28 August 2020, Springer LNCS 12365. https://doi.org/10.1007/978-3-030-58565-5_29.

42.  F. Gondesen, S. Mitra and K.Y. Lam. “Feasibility of PUF based Authentication on ATtiny devices with off-the-shelf SRAM”, The 6th ACM Cyber-Physical System Security Workshop (CPSS 2020), 6 October 2020, Taipei, Taiwan. pp 2-10, https://doi.org/10.1145/3384941.3409591.

43.  F. Li and K.Y. Lam. “Resource Optimization in Satellite-Based Internet of Things”, The 2nd International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2020), February 19-21, 2020, Fukuoka, Japan. IEEE, DOI: 10.1109/ICAIIC48513.2020.9065200.

44.  W.Z. Yang and K.Y. Lam. “Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC”, The 21st International Conference on Information and Communications Security (ICICS 2019), December 15-17, 2019, Beijing, P.R. China. (Winner of Best Student Paper Award). https://doi.org/10.1007/978-3-030-41579-2_9.

45.  T. Wang, X. Yang, X. Ren, J. Zhao and K.Y. Lam. “Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT”, The 38th International Performance Computing and Communications Conference (IPCCC 2019), 29-31 Oct 2019, London, UK. DOI: 10.1109/IPCCC47392.2019.8958751.

46.  X. Yi, K.Y. Lam, E. Bertino and F.Y. Rao. “Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation”, The 24th European Symposium on Research in Computer Security (ESORICS 2019), 23-27 September, 2019, Luxembourg. https://doi.org/10.1007/978-3-030-29962-0_19.

47.  X. Yi and K.Y. Lam. “A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity”, The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS 2019), July 7th – 2th, 2019, Auckland, New Zealand. DOI: 10.1145/3321705.3329816.

48.  Y. Huang, AWK Kong and K.Y. Lam. “Attacking Object Detectors without Changing the Target Object”, The 16th Pacific Rim International Conference on Artificial Intelligence (PRICA 2019), August 26th – 30th 2019, 2019, Yanuca Island, Cuvu, Fiji. https://doi.org/10.1007/978-3-030-29894-4_1.

49.  Y.W. Zhao, C. Wang, C.H. Chi, W-J. van den Heuvel, K.Y. Lam and S. Min. “Beyond the Power of Mere Repetition: Forms of Social Communication on Twitter through the Lens of Information Flows and Its Effect on Topic Evolution”, The 2019 International Joint Conference on Neural Networks (IJCNN), July 14-19, 2019, Budapest, Hungary. DOI: 10.1109/IJCNN.2019.8852290.

50.  J.L. Guo, W.Z. Yang, K.Y. Lam and X. Yi. “Using Blockchain to Control Access to Cloud Data”, The 14th International Conference on Information Security and Cryptology (Inscrypt 2018), December 14-17, 2018, Fuzhou, China, Springer LNCS 11449. DOI: https://doi.org/10.1007/978-3-030-14234-6_15.

51.  B. Srinivasu, P. Vikramkumar, A. Chattopadhyay and K.Y. Lam. “CoLPUF: A Novel Configurable LFSR-based PUF”, Proceedings of the 14th Asia Pacific Conference on Circuits and Systems (APCCAS 2018), October 26-30, 2018, Chengdu, China. Doi: 10.1109/APCCAS.2018.8605643.

52.  Y. Huang, A.W.K. Kong and K.Y. Lam. “From the Perspective of CNN to Adversarial Iris Images”, IEEE 9th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2018), October 22-25, 2018, Los Angeles, California, U.S. DOI: 10.1109/BTAS.2018.8698562.

53.  S. Bose, M. Raikwar, D. Mukhopadhyay, A. Chattopadhyay, K.Y. Lam. “BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICs”, The 2018 IEEE International Conference on Blockchain (Blockchain-2018), July 30 – 3 August 2018, Halifax, Canada. DOI: 10.1109/Cybermatics_2018.2018.00229.

54.  Y.W. Zhao, C. Wang, C.H. Chi, K.Y. Lam and S. Wang. “A Comparative Study of Transactional and Semantic Approaches for Predicting Cascades on Twitter”, Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI -18), July 13-19, 2018, Stockholm, Sweden, pp 1212-1218, doi:10.24963/ijcai.2018/169.

55.  V. Pudi, A. Chattopadhyay, K.Y. Lam. “Efficient and Lightweight Quantized Compressive Sensing Using Mu-Law”, 2018 IEEE International Symposium on Circuits and Systems (ISCAS 2018), May 27-30, 2018, Florence, Italy, IEEE. Doi: 10.1109/ISCAS.2018.8351505.

56.  M. Raikwar, S. Mazumdar, S. Ruj, S.S. Gupta, A. Chattopadhyay, K.Y. Lam. “A Blockchain Framework for Insurance Processes”, 1st International Workshop on Blockchains and Smart Contracts (BSC) in conjunction with the 9th IFIP International Conference on New Technologies, Mobility and Security (IFIP NTMS), February 26-28 2018, Paris, France, IEEE. Doi: 10.1109/NTMS.2018.8328731.

57.  A. Chattopadhyay and K.Y. Lam. “Security of autonomous vehicle as a cyber-physical system,” The 7th International Symposium on Embedded Computing and System Design (ISED), Durgapur, 18-20 December, 2017, pp. 1-6, IEEE. doi: 10.1109/ISED.2017.8303906.

58.  S Sau, J. Haj-Yahya, M.M. Wong, K.Y. Lam and A. Chattopadhyay. “Survey of Secure Processors”, 2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS 2017), 17-20 July, 2017, Pythagorion, Greece, IEEE. Doi: 10.1109/SAMOS.2017.8344637.

59.  V. Sidorov, W.K. Ng, K.Y. Lam, M.F. Bin Mohamed Salleh. “Implications of Cyber Threats for the Design of Unmanned Air Traffic Management System”, The 2017 International Conference on Unmanned Aircraft Systems (ICUAS’17), FL, USA, June 13-16 2017. DOI: 10.1109/ICUAS.2017.7991429.

60.  K.Y. Lam. Securing the Internet of Thing: Cybersecurity from IT to OT, Chapter in Navigating the Digital Age, 35-44, Forbes Media, 2016.

61.  K.Y. Lam, C.H. Chi. “Identity in the Internet-of-Things (IoT): New Challenges and Opportunities”, ICICS 2016: 18-26, Springer. https://doi.org/10.1007/978-3-319-50011-9_2.

 

Patents

·       Lam Kwok Yan, et. al. Method for Generating Cryptographic Key from Biometric Data, Granted on 30 October 2009 (P-No. 139580). Singapore patent application number 200604906-8.

·       Lam Kwok Yan, et. al. Methods of Robust Multi-Factor Authentication and Authorization and Systems Thereof, Granted on 31 July 2012 (P-No. 175860). Singapore patent application number 201108062-9.

·       Lam Kwok Yan, et. al. Method and System of Secure Computing Environment having Auditable Control of Data Movement, Granted on 31 July 2013 (P-No. 185640). Singapore patent application number 201208478-6.

·       Lam Kwok Yan, et. al. Method and System of Secure Computer File Management and Storage having High Level of Usability, Granted on 10 March 2016. Singapore patent application number/Patent Number 11201510347T.

·       Lam Kwok Yan, et. al. Privacy-Preserving Neural Network Based on FHE Scheme, Fast Track Provisional Filing, 24 February 2022. Singapore provisional patent application number 10202201824W.

·       Lam Kwok Yan, et. al. Optimization Of FHE Scheme For Non-Linear Functions: An Efficient Design For LUT-Based Non-Linear Function Evaluation, Fast Track Provisional Filing, 13 May 2022. Singapore provisional patent application number 10202205037W.

·       Lam Kwok Yan, et. al. Privacy-Preserving Neural Network Model And Privacy-Preserving Prediction Using The Privacy-Preserving Neural Network Model, PCT Patent International Filing (claiming priority to earlier SG application nos. 10202201824W & 10202205037W), 15 February 2023, PCT Application No: PCT/SG2023/050085. International Publication No: WO 2023/163652 A2, 31 August 2023.

·       Lam Kwok Yan, et. al. Efficient FHE-Based Training On Encrypted Data, 23 January 2024, Singapore provisional patent application number 10202400198U.

·       Lam Kwok Yan, et. al. Two-Party Privacy-Preserving Subgraph Checking Over Unlabeled Graphs, 15 April 2024, Singapore provisional patent application number 10202401083W.

 

 

Research Students

·       Ph.D. Candidates

§  HUANG Yi: Designing Adversarial Signals Against Three Deep Learning and Non-deep Learning Methods (completed June 2021)

§  GUO Jiale: Privacy-enhancing Mechanisms for Security Data Access and Analysis (completed September 2022)

§  YANG Wenzhuo: Machine Learning Techniques for Advanced Cyber Attack Detection (completed August 2022)

§  TANG Kheng Leong (Part-time): Secure and Privacy Preserving Sharing of Personal Health Records with Multi-Party Pre-Authorization Verification (completed December 2022)

§  LI Zhi: Cross-domain Face Presentation Attack Detection Techniques with Attention to Genuine Faces (completed March 2023)

§  LIU Ziyao: MPC-Enabled Privacy-Preserving Machine Learning (completed May 2023)

§  CHEN Chen: Knowledge Graph Embedding with Deep Learning (completed February 2024)

§  FAN Jiani: Internet-of-Vehicle

§  ZHANG Tinghao: Federated Learning

§  HUANG Elmo: Multi-Party Computation

§  SI Peiyuan: Privacy-Preserving Machine Learning

§  PENG Minyi: Privacy-Preserving Machine Learning

§  ZHENG Qichen: Privacy-Preserving Analytics

§  YE Huanyi: Privacy-Preserving Machine Learning

§  GOH Siqi: Privacy-Preserving Neural Network

§  LEE Nicholas: Deep Learning Techniques for Knowledge Graph Profiling

§  JIANG Weifeng: Towards Trustworthy and Interpretable LLM

·       M.Eng. Candidates

§  HUANG Elmo (Part-time): Permissioned Blockchain for Data Provenance in the Supply Chain with Fine Grained Data Authorization (completed May 2021)

§  LIM Lucas (Part-time): Privacy Preserving Data Analytics in Financial Inclusion and Crowd Computing (completed May 2022)

§  SHEN Jiyuan: Preserving-Preserving Neural Network

§  SHEN Bowen: Privacy-Preserving Machine Learning