Contact

School of Computer Science & Engineering

Room N4.2c.88

NTU, Singapore

awkng@ntu.edu.sg

http://www.ntu.edu.sg/home/awkng

Short Biography

Dr. William K. NG works in the areas of machine learning, privacy-preserving techniques, query-permissible encrypted databases, enterprise blockchain systems, data security, and blockchain security.  His work is motivated by the need to harness the power of data for the betterment of stakeholders, where the data has confidentiality and privacy issues; where the data may be owned and held by different stakeholders, and where the data is so large that it must be hosted in cloud servers that are never completely secured (susceptible to insider and cyber attacks). He contributes to companies and industries as technology consultant on projects involving data analytics, artificial intelligence, data privacy and security, and blockchain.  In recent years, his involvement in conferences and workshop can be found here. His work is supported by various research grants, which can be found here. He is Associate Editor and Member of Editorial Boards of five journals. Over the years, he has worked with many talented students on their PhD (>20) and Master (>20) theses. Dr. Ng writes for online magazines and newspapers and contributes to social causes.

Research Projects
  • Enterprise Blockchain Systems: Current blockchain systems are not built for enterprise use. Reasons are poor performance, security and vulnerability issues, and the lack of facilities to support enterprise data processing needs. This research looks into the fundamental re-design of blockchain for high transaction throughput, confidentiality and privacy issues, the structure of chains, the consensus algorithms, block compression, block indices, block distribution, etc. to address enterprise needs for blockchains.  We investigate hybrid blockchains - public-private mix of ownership, token and token-less mix of blockchain operations, etc.  To support data privacy and advanced data needs, we study the integration of secure multiparty computation with blockchain.

  • Privacy Preserving Data Analytics: To realize the full potential of a smart city, one must harness the massive volume of data that have been (and are still being) generated and accumulated in all work and living aspects of the city. A major obstacle in this regard is data privacy; the need to protect Personally Identifiable Information (PII).  This research  create techniques and systems to address data privacy issues: (1) The need to aggregate data about people from multiple public / private sources for collective data analysis or the application of artificial intelligence techniques without violating privacy; (2) The need to analyze different types of data: numerals, texts, documents, images, etc., which contain sensitive or personal information; (3) The need to understand and manage the data leakage risk of aggregating and analyzing personal data. 

  • Deep Learning/Machine Learning Approach to Threat Alert Triage and Risk Modeling There are many indicators of threat in Know-Your-Clients (KYC) processing, from information systems in use to surveillance inputs to open source intelligence to threat typologies. We want to determine the probability of threat (dependent variable) with respect to the linear or non-linear relationships with the many diverse predictor variables (independent variables).  This must be done in a real-time continuous manner as KYC is dynamic, including multi-hypothesis tracking.   The nature of the relationship among the variables might change with the progression of the time and new types of variables can come into existence that may be proved useful for better prediction accuracy.  We use DL/ML approaches to assist financial institutions in triaging KYC threat alerts (with probability and explainable typologies) and to assess risks.  With sufficient data, we are can infer new indicators of threats and new typologies.

  • Computational Air Mobility: The desire to have air mobility creates a host of computational problems. What is the revenue model for infrastructural air mobility? What is the trade-off between utility provision and safety? What is the relationship between the mobility structure and routing algorithms?   For fleet owners, how many aerial vehicles should they own to sustain a profitable operation?   What is the pros and cons of having fixed flight schedules versus free flight?  We formulate each of these issues as an optimization or constraint satisfaction problem and investigate solution techniques to solve the problems.  We also build a multi-agent modeling and simulation system to support empirical investigations.

Encrypted Database / Blockchain / Cyber-security
  • H. G. Do, W. K. Ng, "Multi-dimensional Range Query on Outsourced Database with Strong Privacy Guarantee," International Journal of Computer Network and Information Security (IJCNIS), Vol. 9, No. 10, Oct 2017.

  • N. A. Huynh, W. K. Ng, "Predicting Risk Level of Executables: an Application of Online Learning," 20th International Conference on Discovery Science (DS'17), Kyoto, Japan, Oct 15-17, 2017. 

  • V. Sidorov, W. K. Ng, M. Faisal, K. Y. Lam, "Cyber-Threat Analysis of a UAV Traffic Management System for Urban Airspace," ATRS World Conference 2017, Antwerp, Belgium, Jul 2017.

  • H. G. Do, W. K. Ng, "Blockchain-based System for Secure Data Storage with Private Keyword Search," IEEE World Congress on Services, Honolulu, HI, USA, Jun 2017.

  • V. Sidorov, W. K. Ng, M. Faisal, K. Y. Lam, "Implications of Cyber Threats for the Design of Unmanned Air Traffic Management System Presentation format," 2017 International Conference on Unmanned Aircraft Systems (ICUAS'17), Miami, Florida, USA, Jun 13-16, 2017. 

  • H. G. Do, W. K. Ng, "Multidimensional Range Query on Outsourced Database with Strong Privacy Guarantee," 14th International Conference on Privacy, Security and Trust, pp. 555-560, Auckland, New Zealand, Dec 2016.

  • T. N. Ho, W. K. Ng, "Application of Stylometry to DarkWeb Forum User Identification," 18th International Conference Information and Communications Security (ICICS'16), Singapore, Nov 2016. 

  • H. G. Do, W. K. Ng, "Private Boolean Query Processing on Encrypted Data," 18th International Conference Information and Communications Security (ICICS'16), Singapore, Nov 2016. 

  • N. A. Huynh, W. K. Ng, H. G. Do, "On Periodic Behavior of Malware: Experiments, Opportunities, and Challenges," 11th International Conference on Malicious and Unwanted Software, Fajardo, Puerto Rico, Oct 18-21, 2016.

  • N. A. Huynh, W. K. Ng, "Uncovering Periodic Network Signals for Cyber Attacks," 13th IEEE Symposium on Visualization for Cyber Security (VizSec'16), Baltimore, USA, Oct 24, 2016.

  • D. H. Tran, W. K. Ng, "Incremental Privacy-Preserving Association Rule Mining Using Negative Border," 11th Pacific Asia Workshop on Intelligence and Security Informatics (PAISI'16), held in conjunction with PAKDD 2016, Auckland, New Zealand, Apr 2016. 

  • V. Sidorov, W. K. Ng, "Towards Performance Evaluation of Oblivious Data Processing Emulated with Partially Homomorphic Encryption Schemes," 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), New York, Apr 2016. 

  • V. Sidorov, W. K. Ng, "A Confidentiality-Preserving Search Technique for Encrypted Relational Cloud Databases," 2nd IEEE International Conference on Big Data Computing Service and Applications (BigDataSerivce), Oxford, UK, Apr 2016. 

  • H. G. Do, W. K. Ng, "Privacy-preserving Triangle Counting in Distributed Graphs," 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), Crans-Montana, Switzerland, Mar 23-25, 2016. 

  • K. Ariyapala, H. G. Do, N. A. Huynh, W. K. Ng, M. Conti, "A Host and Network Based Intrusion Detection For Android Smartphone," Workshop on Security, Trust, Privacy and Analytics (STPA-2016), held in conjunction with 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), Crans-Montana, Switzerland, Mar 23-25, 2016. 

  • V. Sidorov, W. K. Ng, "Model of an Encrypted Relational Database Supporting Complex Predicates in WHERE Clause," IEEE 11th World Congress on Services, Jun 2015, New York, USA.

  • H. G. Do, W. K. Ng, "Privacy-Preserving Approach for Sharing and Processing Intrusion Alert Data," IEEE 10th International Conference on Intelligent Sensors (ISSNIP), Singa- pore, Apr 2015.

  • V. Balachandran, W. K. Ng, S. Emmanuel, "Obfuscation by Code Fragmentation to Evade Reverse Engineering," IEEE International Conference on Systems, Man, and Cybernetics, San Diego, California, Oct 2014.

  • V. Balachandran, W. K. Ng, S. Emmanuel, "Function Level Control Flow Obfuscation for Software Security," 8th International Conference on Complex, Intelligent, and Software Intensive Systems, Birmingham, UK, Jul 2014.

  • V. Sidorov, W. K. Ng, "Model of an Encrypted Cloud Relational Database Supporting Complex Predicates in WHERE Clause," IEEE International Conference on Cloud Computing, Anchorage, Alaska, Jun 2014. 

  • H. G. Do, W. K. Ng, "Secure Reachability Query on Private Shared Graphs," IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Singapore, Apr 2014. 

  • R. P. Lua, C. H. Wah, W. K. Ng, "Cornstarch Effect: Intensifying flow resistance for increasing DDoS attacks in Autonomous Overlay Networks," 11th Annual IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, Jan 2014.

  • R. P. Lua, W. K. Ng, "Autonomic Swarms for Regenerative and Collaborative Networking," 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Work-sharing, Austin, Texas, Oct 2013.

  • H. G. Do, W. K. Ng, Z. Ma, "Privacy-preserving Social Network," 2nd International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2013), Karlsruhe, Germany, Sep 2013.

  • V. Sidorov, W. K. Ng, "Complex Queries in a Shared Multi-user Relational Cloud Database," IEEE International Conference on Cloud Computing, Santa Clara, California, Jun 2013.

  • J. L. Lim, V. Balachandran, S. Emmanuel, W. K. Ng, "Obfuscating Server Client Programs against Reverse Engineering," Second National Conference on Emerging Trends In Computing, India, Jun 2013.

  • M. Xu, W. K. Ng, F. Liu, "An Enterprise-grade Secure Data Storage and Sharing System," 2nd International Conference on Cyber Security, Cyber Warfare and Digital Forensic, Kuala Lumpur, Malaysia, Mar 2013.

  • T. H. Nguyen, H. G. Do, W. K. Ng, H. Zhu, "Cloud-Enabled Data Sharing Model", IEEE International Conference on Intelligence and Security Informatics (ISI2012), Washington DC, Jun 2012.

  • W. K. Ng, Y. Wen, H. Zhu, "Private Data Deduplication Protocols in Cloud Storage," 27th ACM Symposium on Applied Computing (SAC2012), Riva del Garda (Trento), Italy, Mar 2012.

  • D. H. Tran, W. K. Ng, "Towards Security in Sharing Data on Cloud-Based Social Networks," 8th International Conference on Information, Communications, and Signal Processing (ICICS 2011), Singapore, Dec 2011.

  • W. K. Ng, Y. Wen, H. Zhu, "Private query processing on MapReduce," 3rd IEEE Latin-American Conference on Communications (Latincom2011), Belemdo Para, Brazil, Oct 2011. 

 
Privacy-Preserving Data Analytics 
  • H. G. Do, W. K. Ng, "Private Personal Information Verification", Journal of Information Security, Vol. 8 No. 3, 2017. 

  • N. A. Huynh, W. K. Ng, "Learning under Concept Drift with Follow the Regularized Leader and Adaptive Decaying Proximal," Expert Systems with Applications, Vol. 96, pp. 49-63 Apr 2018. 

  • D. H. Tran, W. K. Ng, "Incremental Privacy-Preserving Association Rule Mining," 11th Pacific Asia Workshop on Intelligence and Security Informatics (PAISI'16), held in conjunction with PAKDD 2016, Auckland, New Zealand, Apr 2016. 

  • F. Liu, W. K. Ng, W. Zhang, "Encrypted SVM for Outsourced Data Mining," 8th IEEE International Conference on Cloud Computing, Jun 2015, New York, USA.

  • F. Liu, W. K. Ng, W. Z, "Secure Scalar Product for Big-Data in MapReduce," IEEE International Conference on Big Data Computing Service and Applications, San Francisco, CA, Apr 2015.

  • F.Liu, W.Z, W.K.Ng, "Encrypted Association Rule Mining for Outsourced Data Mining," 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015) Gwangju, Korea, Mar 25-27, 2015.

  • F. Liu, W. Z, W. K. Ng, "Encrypted Gradient Descent Protocol for Outsourced Data Mining," 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015) Gwangju, Korea, Mar 25-27, 2015.

  • L. Fang, W. K. Ng, W. Zhang, "Encrypted Scalar Product Protocol for Outsourced Data Mining," IEEE International Conference on Cloud Computing, Anchorage, Alaska, Jun 2014.

  • F. Liu, W. K. Ng, W. Zhang, H. G. Do, S. Han, "Encrypted Set Intersection Protocol for Outsourced Data-sets," IEEE International Conference on Cloud Engineering, Boston, Massachusetts, Mar 2014.

  • W. Zha, W. K. Ng, "Privacy-Preserving in-network Aggregation in Wireless Sensor Network," 1st International Conference on Sensor Networks (SENSORNETS2012), Rome, Italy, Feb 2012.

  • D. H. Tran, W. K. Ng, "An Efficient Cacheable Secure Scalar Product Protocol for Privacy-Preserving Data Mining," 13th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2011), Toulouse, France, Aug 2011.

  • S. Han, W. K. Ng, L. Wan, C. S. Lee, "Privacy-Preserving Gradient Descent Methods", IEEE Transactions on Knowledge and Data Engineering, pp. 884-899, Vol. 22, No. 6, June 2010.

  • H. D. Tran, W. K. Ng, "CRYPPAR: An Efficient Framework for Privacy Preserving Association Rule Mining over Vertically Partitioned Data", IEEE Region 10 Conference on Emerging Technologies for Sustainable Development (TENCON'09), Singapore, Nov 2009.

  • K. Zhai, W. K. Ng, A. R. Herianto, S. Han, "Speeding Up Secure Computations via Embedded Caching", 9th SIAM International Conference on Data Mining (SDM'09), Sparks, Nevada, USA, May 2009. 

  • S. Han, W. K. Ng, P. S. Yu, "Privacy Preserving Singular Value Decomposition", IEEE International Conference on Data Engineering (ICDE'09), Shanghai, China, Apr 2009. 

  • S. Han, W. K. Ng, "Multi-Party Privacy-Preserving Decision Trees for Arbitrarily Partitioned Data", International Journal on Intelligent Control and Systems, Special Issue on Information Assurance, 2008. 

  • S. Han, W. K. Ng, "Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining", SIAM International Conference on Data Mining (SDM 2008), Atlanta, Georgia, Apr 24-26, 2008. 

  • S. Han, W. K. Ng, "Privacy-Preserving Linear Fisher Discriminant Analysis", Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2008), Osaka, Japan, May 20-23, 2008. 

  • S. Han, W. K. Ng, "Privacy-Preserving Self-Organizing Map", 9th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2007), Regensburg, Germany, 3-7 Sep 2007. 

  • S. Han, W. K. Ng, "Privacy-Preserving Genetic Algorithms for Rule Discovery", 9th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2007), Regensburg, Germany, 3-7 Sep 2007. 

  • W. Li, W. K. Ng, S. Han, V. C. S. Lee, "Privacy-Preservation for Gradient Descent Methods", 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, Aug 12-15, 2007. 

Machine Learning / Classification / Clustering / Association Analysis / Graph Search 
  • J. B. Ong, W. K. Ng, "Hybrid Subspace Mixture Models For Prediction and Anomaly Detection in High Dimensions," 12th International Conference on Advanced Data Mining and Applications (ADMA'17), Singapore, Nov 5-6, 2017. 

  • S. Li, W. L. Tung, W. K. Ng, "A Novelty Detection Machine and Its Application to Bank Failure Prediction," Neurocomputing, 130 (2014) 63–72.

  • S. Li, W. K. Ng, "Maximum Volume Outlier Detection and Its Applications in Credit Risk Analyses," International Journal on Artificial Intelligence Tools, Vol. 22, No. 5, 2013.

  • H. H. Ang, V. Gopalkrishnan, C. H. Hoi, W. K. Ng, "Classification in P2P Networks with Cascade Support Vector Machines," ACM Transactions on Knowledge Discovery from Data, accepted for publication on May 20, 2013.

  • L. Zhu, W. K. Ng, J. Cheng, "Structure and Attribute Index for Approximate Graph Matching in Large Graphs," Information Systems, pp. 958-972, Vol. 36, Iss. 6, Sep 2011.

  • L. Zhu, W. K. Ng, S. Han, "Classifying Graphs using Theoretical Metrics: A Study of Feasibility," International Workshop on Graph-structured Data Bases (GDB2011), in conjunction with 16th International Conference on Database Systems for Advanced Applications (DASFAA'11), Hong Kong, 22-25 Apr 2011.

  • B. Ramadhana, B. Choi, W. K. Ng, "Incremental Maintenance of 2-hop Labeling of Large Graphs", IEEE Transactions on Knowledge and Data Engineering, pp. 682-698, Vol. 22, No. 5, May 2010.

  • H.-H. Ang, V. Gopalkrishnan, W. K. Ng, S. C. H. Hoi, "Adaptive Ensemble Classification in P2P Networks," Database Systems for Advanced Applications (DASFAA'10), Tsukuba, Japan, 1-4 April 2010: 34-48.

  • H.-H. Ang, V. Gopalkrishnan, W. K. Ng, S. C. H. Hoi, "On Classifying Drifting Concepts in P2P Networks," European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD'10), Catalonia, Spain, 20-24 September 2010: 24-39.

  • H.-H. Ang, V. Gopalkrishnan, W. K. Ng, S. C. H. Hoi, "P2PDocTagger: Content management through automated P2P collaborative tagging," 36th International Conference on Very Large Data Bases (VLDB'10), Singapore, 13-17 September 2010: 1601-1604.

  • H. K. Ang, V. Gopalkrishnan, A. Datta, W. K. Ng, C. H. Hoi, "SATRAP: Data and Network Heterogeneity Aware P2P Data Mining", 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD'10), Hyderabad, India, Jun 21-24 2010. 

  • M. Ayyappan, Y.-K. Wong, W. K. Ng, "MICHO: A Scalable Constraint-Based Algorithm for Learning Bayesian Networks", 25th ACM Symposium on Applied Computing, Sierre, Switzerland, Mar 22-26, 2010.

  • H. H. Ang, V. Gopalkrishnan, W. K. Ng, C. H. Hoi "Communication-efficient classification in P2P networks", European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD'09), Bled, Slovenia, Sep 7-11, 2009.

  • L. Zhu, B. Choi, W. K. Ng, B. He, "A Uniform Framework for Ad-hoc Indexes to Answer Reachability Queries on Large Graphs", 14th International Conference on Database Systems for Advanced Applications (DASFAA'09), Brisbane, Australia, Apr 2009.

  • J. S. Sekhon, V. Gopalkrishnan, W. K. Ng, "Proportionate Feature Selection- A Pre-Processing Step for Clustering", IEEE International Conference on Systems, Man, and Cybernetics (SMC 2008), Singapore, 12-15 Oct 2008. 

  • H. K. Ang, V. Gopalkrishnan, C. H. Hoi, W. K. Ng, "Classification in P2P Networks by Bagging Cascade RSVMs", 6th International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P 2008), held in conjunction with VLDB 2008, Auckland, New Zealand, 23 Aug 2008. 

  • H. K. Ang, V. Gopalkrishnan, C. H. Hoi, W. K. Ng, "Cascade RSVM in Peer-to-Peer Network", European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2008), Antwerp, Belgium, 15-19 Sep 2008. 

  • B. Ramadhana, K. K. Choi, W. K. Ng, "On Incremental Maintenance of 2-hop Labeling of Graphs", 17th International World Wide Web Conference (WWW 2008), Beijing, China, Apr 21-25, 2008. 

  • S. Han, W. K. Ng, Y. Yu, "Frequent Substructure Pattern Mining", Sixth International Conference on Information, Communications and Signal Processing (ICICS 2007), 10-13 Dec 2007, Singapore. 

  • W. Li, W. K. Ng, K.-L. Ong, "Enhancing the Effectiveness of Clustering with Spectra Analysis", IEEE Transactions on Knowledge and Data Engineering, Jul 2007. 

 

Stream Data Analytics 
  • H. L. Nguyen, W. K. Ng, D. Woon, "Closed Motifs for Streaming Time Series Classification," Knowledge and Information Systems Journal, accepted for publication on May 9, 2013. 

  • W. Zha, W. K. Ng, "Geographic Routing with Cross Links", 7th International Conference on Knowledge, Information and Creativity Support Systems (KICSS'12), Melbourne, Australia, Nov 2012.

  • H. L. Nguyen, W. K. Ng, D. Woon, "Heterogeneous Ensemble for Feature Drifts in Data Streams," 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2012), Malaysia, Jun 2012.

  • W. Zha, W. K. Ng, "Moving Geographic Routing to Practice," IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems, Thailand, May 2012.

  • W. Zha, W. K. Ng, "Developing Practical Geographical Routing Protocols," 1st International Conference on Sensor Networks (SENSORNETS2012), Rome, Italy, Feb 2012.

  • W. Zha, W. K. Ng, "Prolonging Lifespan of Sensor Networks using Redundant Nodes," Ad Hoc & Sensor Wireless Networks Journal, Accepted for publication Jan 2012.

  • H. L. Nguyen, W. K. Ng, "Concurrent Semi-Supervised Learning of Data Streams," 13th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2011), Toulouse, France, Aug 2011.

  • W. Zha, W. K. Ng, "Predict Energy Consumption of Trigger-driven Sensor Network by Markov Chains," Eighth Workshop on Wireless Ad hoc and Sensor Networks WWASN2011, in conjunction with 31st International Conference on Distributed Computing Systems (ICDCS'11), Minneapolis, 21-24 Jun 2011, USA

  • W. Zha, W. K. Ng, "Energy-Efficient Return-Path Routing in Wireless Sensor Networks", IEEE Region 10 Conference on Emerging Technologies for Sustainable Development (TENCON'09), Singapore, Nov 2009.

  • L. Wan, W. K. Ng, X. H. Dang, P. S. Yu, K. Zhang, "Density-Based Clustering of Data Streams at Multiple Resolutions", ACM Transactions on Knowledge Discovery from Data, Vol. 3, No. 3, Jul 2009. 

  • X. H. Dang, W. K. Ng, K.-L. Ong, "Incremental and Adaptive Clustering Stream Data over Sliding Window", 20th International Conference on Database and Expert Systems Applications, Linz, Austria, 31 Aug- 4 Sep, 2009.

  • X. H. Dang, W. K. Ng, "An EM-based algorithm for Clustering Data Streams in Sliding Windows", 14th International Conference on Database Systems for Advanced Applications (DASFAA'09), Brisbane, Australia, Apr 2009.

  • S. J. Phua, X. Li, B. S. Lim, J. H. Zhou, W. K. Ng, "Signal Stream Clustering for Cutter-Rotation-Level Tool Condition Monitoring in Milling Process", Annual Conference of the Prognostics and Health Management Society, San Diego, CA Sep 27-Oct 1, 2009.

  • X. H. Dang, W. K. Ng, K.-L. Ong, V. C. S. Lee, "Discovering Frequent Sets from Data Streams with CPU Constraint", 6th Australasian Data Mining Conference (AusDM'07), Gold Coast, Australia, 3-4 Dec 2007 [Best Paper Award]. 

  • X. H. Dang, W. K. Ng, "Frequent Sets Mining in Data Stream Environments", Encyclopedia of Data Warehousing and Mining (2nd Ed. ), IGI Publishing, 2007. 

  • X. H. Dang, W. K. Ng, K.-L. Ong, "An Error Bound Guarantee Algorithm for Online Mining Frequent Sets over Data Streams", Journal of Knowledge and Information Systems, 2007. 

 
Product Configuration 
  • L.Wang, W. K. Ng, "Hybrid solving algorithms for an extended dynamic constraint satisfaction problem based configuration system," Concurrent Engineering: Research and Applications, Vol. 20, No. 3, pp. 223-236, 2012.

  • L. Wang, W. K. Ng, "A Hybrid Solving Algorithm for DCSP-Based Configuration System," 8th International Conference on Information, Communications, and Signal Processing (ICICS 2011), Singapore, Dec 2011.

  • L. Wang, W. K. Ng, "Extended DCSP Approach on Product Configuration with Cost Estimation," Concurrent Engineering: Research and Applications, pp. 123-138, Vol. 19, No. 2, Jun 2011.

  • L. Wang, W. K. Ng, B. Song, "Constraint Satisfaction Approach on Product Configuration with Cost Estimation", 22nd International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA-AIE 2009), Taiwan, Jun 2009.

  • L. Wang, W. K. Ng, B. Song, "Semantic Modeling for DCSP-based Product Configuration", IEEE Region 10 Conference on Emerging Technologies for Sustainable Development (TENCON'09), Singapore, Nov 2009.

  • L. Wang, W. K. Ng, B. Song, "Sustaining Product Competitiveness with CSP on Product Configuration and Lifecycle Cost", IEEE Region 10 Conference on Emerging Technologies for Sustainable Development (TENCON'09), Singapore, Nov 2009.

  • H. Liu, V. Gopalkrishnan, W. K. Ng, "Regression Models for Estimating Product Lifecycle Cost", International Journal of Intelligent Manufacturing, Vol. 20, No. 4, pp. 401-408, Aug 2009. 

  • H. Liu, W. K. Ng, V. Gopalkrishnan, S. Bin, X. Li, "An Intelligent System for Estimating Full Product Lifecycle Cost at the Early Design Stage", Special Issue of the International Journal of Product Lifecycle Management (IJPLM), Vol. 3, No. 2/3, pp. 96-113, 2008 [Acceptance rate 18.6%]. 

  • Y. L. Huang, W. K. Ng, W. F. Lu, B. Song, X. Li., "Towards Automatically Generating Constraint-based Configuration Knowledge", Journal of Manufacturing Technology Management, Vol. 19, No. 6, pp. 744-754, 2008. 

  • H. F. Liu, V. Gopalkrishnan, W. K. Ng, B. Sin, X. Li, "Estimating Product Lifecycle Cost Using a Hybrid Approach", Special issue of the International Journal of Product Lifecycle Management, Vol. 20, No. 4, pp. 401-408, Aug 2009. 

  • Y. Huang, H. Liu, W. K. Ng, B. Song, X. Li, "Towards automatically generating constraint-based configuration knowledge", International Conference on Manufacturing Automation, Singapore, May 2007 [Highly Recommended Paper Award]. 

  • H. Liu, W. K. Ng, B. Song, X. Li, W. F. Lu, "Enabling Mass Customization Through Semantic Web Services", IEEE Asia-Pacific Services Computing Conference (APSCC 2007), Tsukuba, Japan, 11-14 Dec 2007. 

  • Y. Huang, W. K. Ng, H. F. Liu, "Deriving Configuration Knowledge and Evaluating Product Variants Through Intelligent Techniques", Sixth International Conference on Information, Communications and Signal Processing (ICICS 2007), 10-13 Dec 2007, Singapore. 

  • H. F. Liu, V. Gopalkrishnan, W. K. Ng, B. Song, X. Li, "Estimating Product Lifecycle Cost Using a Hybrid Approach", 2nd IEEE International Conference on Digital Information Management (ICDIM 2007), 28-31 October 2007, Lyon, France. 

  • B. S. Lim, X. Li, J. Zhou, K. M. Goh, T. W. Tan, W. K. Ng, "Online Self-Learning Design of an Integrated Automated Laboratory Line," 31st Annual Conference of the IEEE Industrial Electronics Society- IECON'05, 2005

  • L. Wang, B. Song, W. K. Ng, X. Li, "A Product Family Based Life Cycle Cost Model for Part Variety and Change Analysis", 16th International Conference on Engineering Design (ICED'07), Paris, France, Aug 28-31, 2007. 

  • S. J. Phua, W. K. Ng, H. Liu, B. Song, X. Li, "A Rule Mining Approach to Emotional Design in Mass Customization", 16th International Conference on Engineering Design (ICED'07), Paris, France, Aug 28-31, 2007. 

  • X. Li, S. J. Phua, W. K. Ng, H. Liu, B. Song, "Customer Preference Reasoning Analysis Through Text Categorization", 16th International Conference on Engineering Design (ICED'07), Paris, France, Aug 28-31, 2007. 

  • H. F. Liu, W. K. Ng, B. Song, X. Li, W. F. Lu, "An Intelligent Information System for Enabling Product Mass Customization," 9th International Conference on Enterprise Information Systems, Portugal, June 2007. 

  • S. J. Phua, W. K. Ng, H. Liu, B. Song, X. Li, "Customer Information System for Product and Service Management: Towards Knowledge Extraction from Textual and Mixed-Format Data", 4th IEEE International Conference on Service Systems and Service Management (ICSSSM2007), Chengdu, China, Jun 9-11, 2007. 

  • Y. L. Huang, W. K. Ng, H. Liu, W. F. Lu, B. Song, X. Li, "Semantic Modeling and Extraction for Cross-family Product Configuration", 4th IEEE International Conference on Service Systems and Service Management (ICSSSM2007), Chengdu, China, Jun 9-11, 2007. 

  • B. Song, X. Li, W. K. Ng, "A Framework for An Intelligent Design-support System Based on Product Lifecycle Data," Int. Conf. Product Lifecycle Management (PLM'06), Bangalore, India, 2006

 

Others 
  • J. B. Ong, W. K. Ng, T. H. Ho, A. Vorobev, "Groupon and Groupon Now: Participating Firm's Profitability Analysis", Computational Economics, pp. 1-16, Sep 2017.

  • S. C. Guntuku, W. Lin, W. K. Ng, L. H. Ungar, D. Preotiuc-Pietro, "Studying Personality through the Content of Posted and Liked Images," 9th International ACM Web Science Conference, Troy, NY, USA, Jun 2017. 

  • D. Rao, W. K. Ng, "A method to compensate users for their information utility," 2nd IEEE International Conference on Big Data Intelligence and Computing, Auckland, New Zealand, August 8-12, 2016 

  • D. Rao, W. K. Ng, "Information Pricing - A User-data-centric Method to Price Information," 23rd IEEE International Conference on Web Services (ICWS), San Francisco, USA, Jun 27-Jul 2, 2016. 

  • D. Rao, W. K. Ng, "A Method to Price Your Information Asset in The Information Market," 5th IEEE International Congress on Big Data, San Francisco, USA, Jun 27-Jul 2, 2016. 

  • D. Rao, W. K. Ng, "Monetizing the User's Information Asset in Internet Information Market," 5th IEEE International Congress on Big Data, San Francisco, USA, Jun 27-Jul 2, 2016. 

  • S. C. Guntuku, S. Roy, W. Lin, K. Ng, W. K. Ng, V. Jakhetiya, "Personalizing User Interfaces for improving quality of experience in VoD recommender systems," 8th International Conference on Quality of Multimedia Experience (QoMEX'16), Lisbon, Portugal, Jun 6-8, 2016.

  • D. Rao, W. K. Ng, "A User-centric Approach to Pricing Information," 2nd IEEE International Conference on Big Data Computing Service and Applications (BigDataSerivce), Oxford, UK, Apr 2016. 

  • L. Z. Zhang, F. Li, J. Zhang, W. K. Ng, "Robustness of Trust Models and Combinations for Handling Unfair Ratings," 6th IFIP WG 11.11 International Conference on Trust Management, Surat, India, May 2012.

  • L. Zhang, H. Fang, W. K. Ng, J. Zhang, "IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation," 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2011), Changsha, China, Nov 2011.

  • L. Zhang, C. P. Tan, S. Li, H. Fang, P. Rai, Y. Chen, L. Rohit, W. K. Ng, "The Influence of Interaction Attributes on Trust in Virtual Communities Trust," Reputation and User Modeling Workshop (TRUM'11), held in conjunction with the International Conference on User Modeling Adaptation and Personalization (UMAP2011), Girona, Spain, Jul 2011.

  • T. Y. Chong, W. T. Ng, Q. Gu, W. K. Ng, "A Study of Green IT Strategies for Going Green Organizations," Annual International Conference on Green Information Technology (GreenIT'10), Singapore, October 2010.

Research Grant
  • Principal Investigator, "Secure, Fully Functional Digital Mobile Payment System with AI-based Fraud Detection Supporting Offline-Online Transactions", Data Science & Artificial Intelligence Research Grant, Sep 2017-Aug 2019.

  • Co-Investigator, "Modelling and Optimizing Home Care and Care-giving Services For The Elderly", Care-at-Home Innovation Grant under National Innovation Challenge on Active and Confident Ageing Ministry of Health National Innovation Challenge Programme Office, Jul 2016-Jul 2019.

  • Principal Investigator, "Data Intelligence for Air Traffic Management", Air Traffic Management Research Institute, Oct 2016-Dec 2017.

  • Principal Investigator, "A Study of Cyber-security Threats to Traffic Management Systems of Unmanned Aircraft Systems", Air Traffic Management Research Institute, May 2016-Nov 2016.

  • Principal Investigator, "Research and Development in Mobile Phone Security III", CSIT Project, Jun 2015-Jun 2017.

  • Principal Investigator, "Research on Integrated Analysis for Cyber-Physical Security", Industry Grant, Sep 2015-Sep 2016.

  • Co-investigator, "A Computer-based Decision Support System for Predictive HSSE Risk Management in Shipping and Ship Management Companies," SMI Project, Dec 2014-Dec 2017.

  • Principal Investigator, "Privacy-preserving Database Systems on Untrusted Servers," Tier 1 Project, Nov 2014-Nov 2016.

  • Principal Investigator, "Research and Development in Mobile Phone Security II", CSIT Project, Mar 2013-Mar 2015.

  • Principal Investigator, "Countering Distributed Denial of Service Attacks using Self-organizing Fast-flux Swarm Network", DIRP Project, Jul 2012-Jul 2015.

  • Principal Investigator, Cyber Security Flagship Initiative, College of Engineering, 2012-2013.

  • Principal Investigator, Secure Cyberspace Platform for Virtual Sustainable Campus with Real-time Continuum - Phase One, Sustainable Earth Office, Dec 2011-Mar 2013.

  • Collaborator, Advanced Techniques for Handling Imbalanced and Unlabelled Data for Classification, A*STAR SERC Grant, Feb 2011-Jan 2013.

  • Co-Investigator, pCloud: Privacy in Data Value Chains using Peer-to-Peer Primitives, A*STAR SERC Grant No. 102 158 0038, Aug 2010-Jul 2013.

 
Conference/Workshop Chair 
  • Senior Program Committee Member, 22th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2018), Melbourne, Australia, May 2018.

  • Senior Program Committee Member, 21th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2017), Jeju, South Korea, May 2017.

  • Senior Program Committee Member, 20th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2016), Auckland, New Zealand, Apr 2016. 

  • Senior Program Committee Member, 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2015), Vietnam, May 2015. 

  • Senior Program Committee Member, 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2014), Tainan, Taiwan, May 2014.

  • Senior Program Committee Member, 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2013), Gold Coast, Australia, Apr 2013.

  • Senior Program Committee Member, 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD2012), Kuala Lumpur, Malaysia, Jun 2012.

  • Program Vice Chair, 11th Pacific Rim International Conference on Artificial Intelligence (PRICAI2010), Daegu, Korea, Sep 2010.

  • Asia Pacific Liaison Chair, 7th IFIP WG6.11 Conference on e-Commerce, e-Business, and e-Government (I3E), Tokyo, 2008.

  • Program Vice Chair, 10th Pacific Rim International Conference on Artificial Intelligence (PRICAI2008), Hanoi, Vietnam, Dec 2008.

  • Area Chair, 12th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD'08), Osaka, Japan, 20-23 May 2008.

This site was designed with the
.com
website builder. Create your website today.
Start Now