Chiew, Kang Leng
41  Ergebnisse:
Personensuche X
?
2

Malware Detection with Structural Entropy Features Using Mu..:

, In: 2022 International Conference on Digital Transformation and Intelligence (ICDI),
 
?
3

Inspiring Technologies for Digital Inclusivity:

Chiew, Kang Leng
Acta Informatica Pragensia.  10 (2021)  2 - p. 121-122 , 2021
 
?
5

Vehicle Routing Problem with Simultaneous Pickup and Delive..:

Sze, San Nah ; Sek, Siaw Ying Doreen ; Sze, Jeeu Fong..
International Journal on Advanced Science, Engineering and Information Technology.  10 (2020)  4 - p. 1360-1366 , 2020
 
?
6

Incoming Work-In-Progress Prediction in Semiconductor Fabri..:

Tin, Tze Chiang ; Chiew, Kang Leng ; Phang, Siew Chee..
Computational Intelligence and Neuroscience.  2019 (2019)  - p. 1-16 , 2019
 
?
 
?
13

Recent Evolutionary Algorithm Variants for Combinatorial Op..:

Anniza Hamdan ; Sze San Nah ; Goh Say Leng..
http://arqiipubl.com/ojs/index.php/AMS_Journal/article/view/515/168.  , 2023
 
?
14

Blind steganalysis:a countermeasure for binary image stegan..:

Chiew, Kang Leng ; Pieprzyk, Josef
Chiew , K L & Pieprzyk , J 2010 , Blind steganalysis : a countermeasure for binary image steganography . in 2010 International Conference on Availability, Reliability and Security (ARES 2010) . , 5438022 , Piscataway, N.J. , pp. 653-658 , 5th International Conference on Availability, Reliability, and Security, ARES - 2010 , Krakow , Poland , 15/02/10 . https://doi.org/10.1109/ARES.2010.66.  , 2010
 
?
15

Estimating hidden message length in binary image embedded b..:

Chiew, Kang Leng ; Pieprzyk, Josef
Chiew , K L & Pieprzyk , J 2010 , Estimating hidden message length in binary image embedded by using boundary pixels steganography . in 2010 International Conference on Availability, Reliability and Security (ARES 2010) . , 5438015 , Piscataway, N.J. , pp. 683-688 , 5th International Conference on Availability, Reliability, and Security, ARES - 2010 , Krakow , Poland , 15/02/10 . https://doi.org/10.1109/ARES.2010.65.  , 2010
 
1-15