default search action
Shih Yin Ooi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Woei Jiuun Tay, Lew Sook Ling, Shih Yin Ooi:
An IKEv2-based Approach for Remote Access VPN on MikroTik Router. J. Inf. Sci. Eng. 40(5): 1093-1114 (2024) - 2023
- [j18]Sarmela Raja Sekaran, Pang Ying Han, Shih Yin Ooi:
Smartphone-based human activity recognition using lightweight multiheaded temporal convolutional network. Expert Syst. Appl. 227: 120132 (2023) - [j17]Kiu Nai Pau, Vicki Wei Qi Lee, Shih Yin Ooi, Ying-Han Pang:
The Development of a Data Collection and Browser Fingerprinting System. Sensors 23(6): 3087 (2023) - [c19]Check-Yee Law, Michael Goh Kah Ong, Shih Yin Ooi, Lee-Ying Chong, Cha-Yi Ing, Ying-Ying Yong:
A Pilot Study of Learning Programming with ScratchJr. FICC (1) 2023: 785-793 - [c18]Sarmela Ap Raja Sekaran, Ying-Han Pang, Shih Yin Ooi:
Cascading Global and Local Deep Features for Smartphone-based Human Activity Classification. ICSCA 2023: 328-334 - 2022
- [j16]Yee Jian Chew, Nicholas Lee, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang:
Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling. Inf. Secur. J. A Glob. Perspect. 31(5): 544-565 (2022) - 2021
- [j15]Wee-How Khoh, Ying-Han Pang, Andrew Beng Jin Teoh, Shih Yin Ooi:
In-air hand gesture signature using transfer learning and its forgery attack. Appl. Soft Comput. 113(Part): 108033 (2021) - [j14]Jit Yan Lim, Kian-Ming Lim, Shih Yin Ooi, Chin-Poo Lee:
Efficient-PrototypicalNet with self knowledge distillation for few-shot learning. Neurocomputing 459: 327-337 (2021) - [j13]Wee-How Khoh, Ying-Han Pang, Shih Yin Ooi, Hui-Yen Yap:
Spatiotemporal spectral histogramming analysis in hand gesture signature recognition. J. Intell. Fuzzy Syst. 40(3): 4275-4286 (2021) - [j12]Kok-Seng Wong, Yee Jian Chew, Shih Yin Ooi, Ying-Han Pang:
Toward forecasting future day air pollutant index in Malaysia. J. Supercomput. 77(5): 4813-4830 (2021) - [c17]Daniel Lai, Lew Sook Ling, Shih Yin Ooi:
Modified TPACK Framework for Teachers' Efficiency, Students' Performance and Students' Engagement. ICICT (1) 2021: 827-835 - [c16]Daniel Lai, Lew Sook Ling, Shih Yin Ooi:
Proposed Integration of Mobile Interactive System in the Classroom. ICICT (1) 2021: 837-845 - [i2]Ying-Han Pang, Liew Yee Ping, Goh Fan Ling, Shih Yin Ooi, Wee-How Khoh:
Stacked deep analytic model for human activity recognition on a UCI HAR database. F1000Research 10: 1046 (2021) - [i1]Sarmela Raja Sekaran, Ying-Han Pang, Goh Fan Ling, Shih Yin Ooi:
MSTCN: A multiscale temporal convolutional network for user independent human activity recognition. F1000Research 10: 1261 (2021)
2010 – 2019
- 2019
- [j11]Shih Yin Ooi, Andrew Beng Jin Teoh:
Touch-Stroke Dynamics Authentication Using Temporal Regression Forest. IEEE Signal Process. Lett. 26(7): 1001-1005 (2019) - [c15]Jinwei Zhi, Shih Yin Ooi, Andrew Beng Jin Teoh:
Learning-Based Index-of-Maximum Hashing for Touch-Stroke Template Protection. CISP-BMEI 2019: 1-6 - [c14]NorulNarijah Mohamed Zamri, Goh Fan Ling, Pang Ying Han, Shih Yin Ooi:
Vision-based Human Action Recognition on Pre-trained AlexNet. ICCSCE 2019: 1-5 - [c13]Yee Jian Chew, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang:
Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System. ICSCA 2019: 569-573 - 2018
- [j10]Yit Yin Wee, Wooi Ping Cheah, Shih Yin Ooi, Shing Chiang Tan, Kuokkwee Wee:
Application of Bayesian belief networks and fuzzy cognitive maps in intrusion analysis. J. Intell. Fuzzy Syst. 35(1): 111-122 (2018) - [j9]Yee Jian Chew, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang, Seong Oun Hwang:
Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system. J. Intell. Fuzzy Syst. 35(6): 5927-5937 (2018) - [j8]Nicholas Lee, Shih Yin Ooi, Ying-Han Pang, Seong Oun Hwang, Syh-Yuan Tan:
Study of long short-term memory in flow-based network intrusion detection system. J. Intell. Fuzzy Syst. 35(6): 5947-5957 (2018) - [j7]Ying-Han Pang, Andrew Beng Jin Teoh, Shih Yin Ooi, Cheng-Yaw Low:
Enhanced independent spectral histogram representations in face recognition. Multim. Tools Appl. 77(11): 14259-14284 (2018) - [j6]Shih Yin Ooi, Shing Chiang Tan, Wooi Ping Cheah:
Temporal Sleuth Machine with decision tree for temporal classification. Soft Comput. 22(24): 8077-8095 (2018) - [c12]Pang Ying Han, Khor Ean Yee, Shih Yin Ooi:
Localized Temporal Representation in Human Action Recognition. ICNCC 2018: 261-266 - 2017
- [j5]Shih Yin Ooi, Shing Chiang Tan, Wooi Ping Cheah:
Temporal sampling forest (TS - F): an ensemble temporal learner. Soft Comput. 21(23): 7039-7052 (2017) - 2016
- [j4]Shih Yin Ooi, Andrew Beng Jin Teoh, Ying-Han Pang, Bee Yan Hiew:
Image-based handwritten signature verification using hybrid methods of discrete Radon transform, principal component analysis and probabilistic neural network. Appl. Soft Comput. 40: 274-282 (2016) - [c11]Ying-Han Pang, Khor Ean Yee, Shih Yin Ooi:
Biometric Access Control with High Dimensional Facial Features. ACISP (2) 2016: 437-445 - [c10]Shih Yin Ooi, Shing Chiang Tan, Wooi Ping Cheah:
Classifying Human Activities with Temporal Extension of Random Forest. ICONIP (4) 2016: 3-10 - 2015
- [c9]Khor Ean Yee, Pang Ying Han, Shih Yin Ooi, Wee Kuok Kwee:
Can subspace based learning approach perform on makeup face recognition? ICCSCE 2015: 13-18 - [c8]Goh Fan Ling, Pang Ying Han, Khor Ean Yee, Shih Yin Ooi:
Face recognition via semi-supervised discriminant local analysis. ICSIPA 2015: 292-297 - [c7]Ling Cong Xiang, Shih Yin Ooi, Pang Ying Han:
Intelligent web crawler for file safety inspection. ICSIPA 2015: 309-314 - [c6]Kevin Yeo, Shih Yin Ooi, Pang Ying Han, Wee Kuok Kwee:
Real time mobile application of in-air signature with Fast Dynamic Time Warping (FastDTW). ICSIPA 2015: 315-320 - 2014
- [j3]Shih Yin Ooi, Shing Chiang Tan, Wooi Ping Cheah:
Temporal Decision Tree and Interpretable Temporal Rules: J48 and Fuzzy Cognitive Maps Approach. Aust. J. Intell. Inf. Process. Syst. 14(1) (2014) - [c5]Shih Yin Ooi, Shing Chiang Tan, Wooi Ping Cheah:
Anomaly Based Intrusion Detection through Temporal Classification. ICONIP (3) 2014: 612-619 - [c4]Goh Fan Ling, Pang Ying Han, Liew Yee Ping, Shih Yin Ooi, Chu Kiong Loo:
Wavelet Based SDA for Face Recognition. ICONIP (3) 2014: 628-635 - 2013
- [c3]Nima Saed, Tze Hui Liew, Kuokkwee Wee, Shih Yin Ooi:
Video and voice transmission over LTE networks. ICCSCE 2013: 259-263 - 2011
- [c2]Tee Wilkin, Shih Yin Ooi:
State of the art: Signature verification system. IAS 2011: 110-115 - 2010
- [j2]Bee Yan Hiew, Andrew Beng Jin Teoh, Shih Yin Ooi:
A secure digital camera based fingerprint verification system. J. Vis. Commun. Image Represent. 21(3): 219-231 (2010) - [j1]Bee Yan Hiew, Andrew Teoh Beng Jin, Shih Yin Ooi, Fathin Fakhriah Abdul Aziz:
A Secure Touch-less based Fingerprint Verification System. J. WSCG 18(1-3): 1-8 (2010)
2000 – 2009
- 2007
- [c1]Shih Yin Ooi, Andrew Beng Jin Teoh, Thian Song Ong:
Offline Signature Verification through Biometric Strengthening. AutoID 2007: 226-231
Coauthor Index
aka: Pang Ying Han
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint