Name
Affiliation
Papers
KIM-KWANG RAYMOND CHOO
School of Computer and Information Science, University of South Australia, Australia
780
Collaborators
Citations 
PageRank 
1479
4103
362.49
Referers 
Referees 
References 
7429
18998
10372
Search Limit
1001000
Title
Citations
PageRank
Year
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage10.342022
Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks00.342022
Artificial intelligence in cyber security: research advances, challenges, and opportunities20.362022
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain00.342022
SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones00.342022
Privacy, accuracy, and model fairness trade-offs in federated learning00.342022
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions00.342022
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems00.342022
Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud20.412022
Multicopy and Multiserver Provable Data Possession for Cloud-Based IoT00.342022
Edge Computing and Lightning Network Empowered Secure Food Supply Management10.362022
A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things00.342022
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System40.372021
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing20.382021
Cross-domain authentication for 5G-enabled UAVs: a blockchain approach00.342021
Obfp: Optimized Blockchain-Based Fair Payment For Outsourcing Computations In Cloud Computing00.342021
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks10.352021
Editorial for accountability and privacy issues in blockchain and cryptocurrency00.342021
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data40.372021
Blockchain-based multi-party proof of assets with privacy preservation10.352021
Multi-Area Throughput and Energy Optimization of UAV-aided Cellular Networks Powered by Solar Panels and Grid30.382021
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity00.342020
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.140.552020
A Review Of Supervised Classification Based On Contrast Patterns: Applications, Trends, And Challenges20.362020
White-Box Implementation of Shamir’s Identity-Based Signature Scheme00.342020
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers10.362020
An Adaptive Grid Frequency Support Mechanism For Energy Management In Cloud Data Centers00.342020
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security110.482020
MMDA: Multidimensional and Multidirectional Data Aggregation for Edge Computing-Enhanced IoT20.362020
A multiview learning method for malware threat hunting: windows, IoT and android as case studies20.362020
P4-to-Blockchain: A Secure Blockchain-enabled Packet Parser for Software Defined Networking60.432020
An Efficient Privacy-Preserving Protocol for Computing k-th Minimum Value in P2P Networks10.362020
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment70.422020
Privacy Concerns and Benefits of Engagement with Social Media-enabled Apps: A Privacy Calculus Perspective00.342020
A task scheduling algorithm considering game theory designed for energy management in cloud computing110.582020
A task scheduling algorithm considering game theory designed for energy management in cloud computing110.582020
Secure Range Search over Encrypted Uncertain IoT Outsourced Data70.452019
Blockchain based secure data sharing system for Internet of vehicles: A position paper.50.392019
Game theoretic security of quantum bit commitment.00.342019
Energy Efficient Decentralized Authentication In Internet Of Underwater Things Using Blockchain00.342019
On Data Sovereignty in Cloud-based Computation Offloading for Smart Cities Applications00.342019
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems170.622019
A Novel Social Situation Analytics-Based Recommendation Algorithm For Multimedia Social Networks00.342019
Improved t-SNE based manifold dimensional reduction for remote sensing data processing30.412019
Parking Management: A Blockchain-Based Privacy-Preserving System30.412019
Secure Key Agreement and Key Protection for Mobile Device User Authentication.90.432019
Enabling verifiable multiple keywords search over encrypted cloud data.80.422018
Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices.90.562018
Efficient Revocable Id-Based Encryption With Cloud Revocation Server00.342018
Towards Better Ocular Recognition for Secure Real-World Applications10.412018
  • 1
  • 2