Penny Chong
Penny Chong
Bestätigte E-Mail-Adresse bei mymail.sutd.edu.sg
Titel
Zitiert von
Zitiert von
Jahr
Mouse authentication without the temporal aspect–what does a 2d-cnn learn?
P Chong, YXM Tan, J Guarnizo, Y Elovici, A Binder
2018 IEEE Security and Privacy Workshops (SPW), 15-21, 2018
122018
User authentication based on mouse dynamics using deep neural networks: A comprehensive study
P Chong, Y Elovici, A Binder
IEEE Transactions on Information Forensics and Security 15, 1086-1101, 2019
102019
ImageCLEF 2017: ImageCLEF Tuberculosis Task-the SGEast Submission.
J Sun, P Chong, YXM Tan, A Binder
CLEF (Working Notes), 2017
102017
A novel pedestrian detection and tracking with boosted HOG classifiers and Kalman filter
P Chong, YH Tay
2016 IEEE Student Conference on Research and Development (SCOReD), 1-5, 2016
42016
Simple and Effective Prevention of Mode Collapse in Deep One-Class Classification
P Chong, L Ruff, M Kloft, A Binder
arXiv preprint arXiv:2001.08873, 2020
32020
Pedestrian Detection and Tracking in Surveillance Video
P Chong
UTAR, 2016
12016
Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
YXM Tan, P Chong, J Sun, Y Elovici, A Binder
arXiv preprint arXiv:2012.06330, 2020
2020
Deja vu from the SVM Era: Example-based Explanations with Outlier Detection
P Chong, Y Elovici, A Binder
arXiv preprint arXiv:2011.05577, 2020
2020
Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques
I Sadek, P Chong, SU Rehman, Y Elovici, A Binder
Data in brief 26, 104437, 2019
2019
SPW 2018
N Carlini, D Wagner, J Saxe, R Harang, C Wild, H Sanders, P Chong, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10