Follow
Vik Tor Goh
Title
Cited by
Cited by
Year
Multiple error detection and correction based on redundant residue number systems
VT Goh, MU Siddiqi
IEEE Transactions on Communications 56 (3), 325-330, 2008
1532008
Identification of road surface conditions using IoT sensors and machine learning
JR Ng, JS Wong, VT Goh, WJ Yap, TTV Yap, H Ng
Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019
452019
Network packet payload parity based steganography
OI Abdullaziz, VT Goh, HC Ling, KS Wong
2013 IEEE Conference on Sustainable Utilization and Development in …, 2013
272013
Experimenting with an intrusion detection system for encrypted networks
VT Goh, J Zimmermann, M Looi
International Journal of Business Intelligence and Data Mining 5 (2), 172-191, 2010
242010
Towards intrusion detection for encrypted networks
VT Goh, J Zimmermann, M Looi
2009 International Conference on Availability, Reliability and Security, 540-545, 2009
212009
Simple and scalable blockchain with privacy
WK Chan, JJ Chin, VT Goh
Journal of Information Security and Applications 58, 102700, 2021
202021
AIPISteg: An active IP identification based steganographic method
OI Abdullaziz, VT Goh, HC Ling, KS Wong
Journal of Network and Computer Applications 63, 150–158, 2016
162016
Android based self-diagnostic electrocardiogram system for mobile healthcare
KY Choo, HC Ling, YC Lo, ZH Yap, JS Pua, RCW Phan, VT Goh
Technology and health care 23 (s2), S435-S442, 2015
162015
Autonomous road potholes detection on video
JJ Koh, TTV Yap, H Ng, VT Goh, HL Tong, CC Ho, TY Kuek
Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019
142019
Vehicle classification using convolutional neural network for electronic toll collection
ZJ Wong, VT Goh, TTV Yap, H Ng
Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020
122020
Daily activities classification on human motion primitives detection dataset
ZH Chin, H Ng, TTV Yap, HL Tong, CC Ho, VT Goh
Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019
122019
A novel error correction scheme based on the Chinese Remainder Theorem
VT Goh, M Tinauli, MU Siddiqi
The Ninth International Conference on Communications Systems, 2004. ICCS 2004., 2004
92004
Intrusion detection system for encrypted networks using secret-sharing schemes
V Goh, J Zimmermann, M Looi
Proceedings of 2nd International Cryptology Conference 2010, 126-132, 2010
82010
A machine learning approach to predictive Modelling of student performance
H Ng, AA bin Mohd Azha, TTV Yap, VT Goh
F1000Research 10, 2021
62021
Comparison of Word Embeddings for Sentiment Classification with Preconceived Subjectivity
XJ Lee, TTV Yap, H Ng, VT Goh
International Conference on Computer, Information Technology and Intelligent …, 2022
52022
Performance of Sentiment Classification on Tweets of Clothing Brands
H Ng, MS Jalani, TTV Yap, VT Goh
Journal of Informatics and Web Engineering 1 (1), 16-22, 2022
52022
Evolution of Bitcoin addresses from security perspectives
WK Chan, JJ Chin, VT Goh
2020 15th International Conference for Internet Technology and Secured …, 2020
52020
Exploratory graph analysis of the network data of the Ethereum blockchain
TTV Yap, TF Ho, H Ng, VT Goh
F1000Research 10, 908, 2021
42021
Attention Models for Sentiment Analysis Using Objectivity and Subjectivity Word Vectors
WS Lee, H Ng, TTV Yap, CC Ho, VT Goh, HL Tong
Computational Science and Technology: 7th ICCST 2020, Pattaya, Thailand, 29 …, 2021
42021
Detecting attacks in encrypted networks using secret-sharing schemes
V Goh, J Zimmermann, M Looi
International Journal of Cryptology Research 2 (1), 89-99, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20