Energy harvesting for wearable devices: A review YW Chong, W Ismail, K Ko, CY Lee IEEE Sensors Journal 19 (20), 9047-9062, 2019 | 178 | 2019 |
A review on the role of blockchain technology in the healthcare domain HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah Electronics 8 (6), 679, 2019 | 114 | 2019 |
Detection techniques of distributed denial of service attacks on software-defined networking controller–a review MA Aladaileh, M Anbar, IH Hasbullah, YW Chong, YK Sanjalawe IEEE Access 8, 143985-143995, 2020 | 72 | 2020 |
Machine learning techniques to detect a DDoS attack in SDN: A systematic review TE Ali, YW Chong, S Manickam Applied Sciences 13 (5), 3183, 2023 | 61 | 2023 |
Artificial intelligence marketing (AIM) for enhancing customer relationships KLA Yau, NM Saad, YW Chong Applied Sciences 11 (18), 8562, 2021 | 56 | 2021 |
Comparative performance analysis of classification algorithms for intrusion detection system M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla 2016 14th annual conference on privacy, security and trust (PST), 282-288, 2016 | 38 | 2016 |
Adaptive path finding algorithm in dynamic environment for warehouse robot MK Ng, YW Chong, K Ko, YH Park, YB Leau Neural Computing and Applications 32, 13155-13171, 2020 | 31 | 2020 |
Security mechanism for IPv6 stateless address autoconfiguration S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ... 2015 International Conference on Automation, Cognitive Science, Optics …, 2015 | 27 | 2015 |
Augmented intelligence: surveys of literature and expert opinion to understand relations between human intelligence and artificial intelligence KLA Yau, HJ Lee, YW Chong, MH Ling, AR Syed, C Wu, HG Goh IEEE Access 9, 136744-136761, 2021 | 26 | 2021 |
Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS) MA Al-Adaileh, M Anbar, YW Chong, A Al-Ani MATEC Web of Conferences 218, 02012, 2018 | 23 | 2018 |
Hybrid monitoring technique for detecting abnormal behaviour in rpl-based network. M Alzubaidi, M Anbar, YW Chong, S Al-Sarawi J. Commun. 13 (5), 198-208, 2018 | 22 | 2018 |
Optimized access point selection with mobility prediction using hidden Markov model for wireless network KL Yap, YW Chong 2017 ninth international conference on ubiquitous and future networks (ICUFN …, 2017 | 22 | 2017 |
An optimized flow management mechanism in OpenFlow network ETB Hong, CY Wey 2017 International Conference on Information Networking (ICOIN), 143-147, 2017 | 22 | 2017 |
Securing duplicate address detection on IPv6 using distributed trust mechanism S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ... Int J Simulation—Systems, Sci Technol 17 (26), 2016 | 22 | 2016 |
An intelligent cluster-based routing scheme in 5G flying ad hoc networks MF Khan, KLA Yau, MH Ling, MA Imran, YW Chong Applied Sciences 12 (7), 3665, 2022 | 21 | 2022 |
Enhanced handover mechanism using mobility prediction in wireless networks KL Yap, YW Chong, W Liu PloS one 15 (1), e0227982, 2020 | 21 | 2020 |
Comparison of ML/DL approaches for detecting DDoS attacks in SDN TE Ali, YW Chong, S Manickam Applied Sciences 13 (5), 3033, 2023 | 20 | 2023 |
Network security situation assessment: A review and discussion YB Leau, S Manickam, YW Chong Information Science and Applications, 407-414, 2015 | 18 | 2015 |
Applications of multi-agent deep reinforcement learning: Models and algorithms AM Ibrahim, KLA Yau, YW Chong, C Wu Applied Sciences 11 (22), 10870, 2021 | 17 | 2021 |
An iot platform for urban farming EK Tan, YW Chong, M Niswar, BY Ooi, A Basuki 2020 International Seminar on Intelligent Technology and Its Applications …, 2020 | 17 | 2020 |