yl ho | Multimedia University (original) (raw)
Uploads
Papers by yl ho
Roaming across heterogeneous wireless networks poses a challenging issue in mobility management s... more Roaming across heterogeneous wireless networks poses a challenging issue in mobility management such as seamless and efficient handover to reduce end-user's service interruption. Efficient techniques for seamless handover between access points (APs) when user roams from one area to another can be categorized into three stages in conventional way, i) initiation, ii) preparation, and iii) execution. However, frequent handover may overload the network with signalling traffic and causes call dropping to increase as well. This paper takes a deeper look at predictive triggers at the link layer. With an appropriate implementation of predictive triggering algorithms, early handover initiation and preparation could be performed. This paper addresses the investigation on predictive and accurate mechanisms to generate a handover trigger.
Mobile malware is an increasing threat to the world of handheld devices, which can prove to be co... more Mobile malware is an increasing threat to the world of handheld devices, which can prove to be costlier than PC viruses in the future. The current method used to combat mobile malware is virus signature matching which is based on the slow process of reverse engineering. This paper studies the growth, spread and generic behaviors of mobile and ubiquitous malware in mobile phones. We extend the works of Bose et al. and Schmidt et al. with an additional feature to reduce the effectiveness of mobile malware propagation. The objective of our work is to investigate the trends and generic behavioral patterns of mobile malware and suggest a generic proof-of-concept model which combines the works of Bose et al. and Schmidt et al. with a new feature to slowdown the spread of known and unknown mobile malware which may share similar behavioral patterns.
This paper discusses about lips and eyebrows are used to detect driver cognitive distraction by u... more This paper discusses about lips and eyebrows are used to detect driver cognitive distraction by using faceAPI toolkit. A few number of classification algorithms like Support Vector Machine (SVM), Logistic Regression (LR) and Static Bayesian Network (SBN) and Dynamic Bayesian Network (DBN) have been used for accuracy rate comparison. A real time experiment was set and driver's facial expression was captured by using faceAPI toolkit. From initial experiment, result has shown that lips and eyebrows are highly correlated when a driver is cognitively distracted. Fusion between these two features with head movement has improved the accuracy rate in cognitive distraction detection. Lips and eyebrows are capable to be an indicator for driver cognitive distraction detection. A few number of available classification algorithms can be used to evaluate the features and parameters chosen.
Block cipher algorithms are commonly used to secure confidential information in everyday user app... more Block cipher algorithms are commonly used to secure confidential information in everyday user applications However, it is quite common for ignorant users to use familiar dictionary words as their personal passwords. This research will examine the effects of weakly chosen password-keys on the security of
802.11i is the latest security standard for wireless LAN (WLAN). It provides data confidentiality... more 802.11i is the latest security standard for wireless LAN (WLAN). It provides data confidentiality and integrity. The 802.11i 4-way handshake and key management remains secure against any attack which could compromise the key. However, availability protection is still an issue as 802.11i is subjected to denial of service attacks. Since Message 1 in the 4-way handshake is not protected by any mechanism, forging these messages is possible. This paper presents a light and simple implementation to deter DoS attacks against the 4-way handshake protocol.
Roaming across heterogeneous wireless networks poses a challenging issue in mobility management s... more Roaming across heterogeneous wireless networks poses a challenging issue in mobility management such as seamless and efficient handover to reduce end-user's service interruption. Efficient techniques for seamless handover between access points (APs) when user roams from one area to another can be categorized into three stages in conventional way, i) initiation, ii) preparation, and iii) execution. However, frequent handover may overload the network with signalling traffic and causes call dropping to increase as well. This paper takes a deeper look at predictive triggers at the link layer. With an appropriate implementation of predictive triggering algorithms, early handover initiation and preparation could be performed. This paper addresses the investigation on predictive and accurate mechanisms to generate a handover trigger.
Mobile malware is an increasing threat to the world of handheld devices, which can prove to be co... more Mobile malware is an increasing threat to the world of handheld devices, which can prove to be costlier than PC viruses in the future. The current method used to combat mobile malware is virus signature matching which is based on the slow process of reverse engineering. This paper studies the growth, spread and generic behaviors of mobile and ubiquitous malware in mobile phones. We extend the works of Bose et al. and Schmidt et al. with an additional feature to reduce the effectiveness of mobile malware propagation. The objective of our work is to investigate the trends and generic behavioral patterns of mobile malware and suggest a generic proof-of-concept model which combines the works of Bose et al. and Schmidt et al. with a new feature to slowdown the spread of known and unknown mobile malware which may share similar behavioral patterns.
This paper discusses about lips and eyebrows are used to detect driver cognitive distraction by u... more This paper discusses about lips and eyebrows are used to detect driver cognitive distraction by using faceAPI toolkit. A few number of classification algorithms like Support Vector Machine (SVM), Logistic Regression (LR) and Static Bayesian Network (SBN) and Dynamic Bayesian Network (DBN) have been used for accuracy rate comparison. A real time experiment was set and driver's facial expression was captured by using faceAPI toolkit. From initial experiment, result has shown that lips and eyebrows are highly correlated when a driver is cognitively distracted. Fusion between these two features with head movement has improved the accuracy rate in cognitive distraction detection. Lips and eyebrows are capable to be an indicator for driver cognitive distraction detection. A few number of available classification algorithms can be used to evaluate the features and parameters chosen.
Block cipher algorithms are commonly used to secure confidential information in everyday user app... more Block cipher algorithms are commonly used to secure confidential information in everyday user applications However, it is quite common for ignorant users to use familiar dictionary words as their personal passwords. This research will examine the effects of weakly chosen password-keys on the security of
802.11i is the latest security standard for wireless LAN (WLAN). It provides data confidentiality... more 802.11i is the latest security standard for wireless LAN (WLAN). It provides data confidentiality and integrity. The 802.11i 4-way handshake and key management remains secure against any attack which could compromise the key. However, availability protection is still an issue as 802.11i is subjected to denial of service attacks. Since Message 1 in the 4-way handshake is not protected by any mechanism, forging these messages is possible. This paper presents a light and simple implementation to deter DoS attacks against the 4-way handshake protocol.