Chun Yong Chong

Chun Yong Chong
Monash University (Malaysia) · School of Information Technology

About

38
Publications
6,369
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
321
Citations
Citations since 2016
31 Research Items
302 Citations
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080

Publications

Publications (38)
Preprint
Conventional approaches to identify depression are not scalable, and the public has limited awareness of mental health, especially in developing countries. As evident by recent studies, social media has the potential to complement mental health screening on a greater scale. The vast amount of first-person narrative posts in chronological order can...
Article
Continuous authentication can provide a mechanism to continuously monitor mobile devices while a user is actively using it, after passing the initial-login authentication phase. Touch biometric is one of the promising modality to realise continuous authentication on mobile devices by distinguishing between the touch strokes performed by the legitim...
Chapter
Staying mobile is the key to ensuring high quality of life for older adults. With the impact of the COVID-19 pandemic, the ability to live and move around independently becomes more critical for the most aging society. While several efforts have been made to invest in mobility solutions to help improve older adults’ mobility, there is still a lack...
Preprint
Deepfakes utilise Artificial Intelligence (AI) techniques to create synthetic media where the likeness of one person is replaced with another. There are growing concerns that deepfakes can be maliciously used to create misleading and harmful digital contents. As deepfakes become more common, there is a dire need for deepfake detection technology to...
Article
Full-text available
Fairness of deepfake detectors in the presence of anomalies are not well investigated, especially if those anomalies are more prominent in either male or female subjects. The primary motivation for this work is to evaluate how deepfake detection model behaves under such anomalies. However, due to the black-box nature of deep learning (DL) and artif...
Preprint
Full-text available
Fairness of deepfake detectors in the presence of anomalies are not well investigated, especially if those anomalies are more prominent in either male or female subjects. The primary motivation for this work is to evaluate how deepfake detection model behaves under such anomalies. However, due to the black-box nature of deep learning (DL) and artif...
Article
Full-text available
Fog computing is a potential solution for the Internet of Things in close connection with things and end-users. Fog computing will easily transfer sensitive data without delaying distributed devices. Moreover, fog computing is more in real-time streaming applications, sensor networks, IoT which need high speed and reliable internet connectivity. Du...
Article
Maintenance of existing software requires a large amount of time for comprehending the source code. The architecture of a software, however, may not be clear to maintainers if up-to-date documentations are not available. Software clustering is often used as a remodularisation and architecture recovery technique to help recover a semantic representa...
Preprint
With the rise of AI in SE, researchers have shown how AI can be applied to assist software developers in a wide variety of activities. However, it has not been accompanied by a complementary increase in labelled datasets, which is required in many supervised learning methods. Several studies have been using crowdsourcing platforms to collect labell...
Preprint
Full-text available
Maintenance of existing software requires a large amount of time for comprehending the source code. The architecture of a software, however, may not be clear to maintainers if up to date documentations are not available. Software clustering is often used as a remodularisation and architecture recovery technique to help recover a semantic representa...
Chapter
Since the advent of scholarly recommender systems (SRSs), more than 200 papers in the related area have been published. Many of these papers focus on proposing new and more accurate algorithms, or to enhance existing ones. Recently we have seen growing interest in embedding recommending methods into User Experience (UX), to enhance the value of RSs...
Article
The advancement in the computational capability and storage size of a modern mobile device has evolved it into a multi-purpose smart device for individual and business needs. The increasing usage of this device has led to the need for a secure and efficient authentication mechanism. For securing mobile devices, password, PIN, and swipe patterns are...
Preprint
Full-text available
Synthesising photo-realistic images from natural language is one of the challenging problems in computer vision. Over the past decade, a number of approaches have been proposed, of which the improved Stacked Generative Adversarial Network (StackGAN-v2) has proven capable of generating high resolution images that reflect the details specified in the...
Article
Measuring and estimating the reusability of software components is important towards finding reusable candidates. Researchers have shown that software metrics can be effectively used to assess software reusability. This work provides a systematic literature review to investigate the main factors that influence software reusability and how these ide...
Preprint
Full-text available
Code review is a widely-used practice in software development companies to identify defects. Hence, code review has been included in many software engineering curricula at universities worldwide. However, teaching code review is still a challenging task because the code review effectiveness depends on the code reading and analytical skills of a rev...
Article
Waste electric and electronic equipment or e-waste generation has been identified as a key aspect in solid waste management, though e-waste disposal in landfills is not suggested due to the toxic chemicals and heavy metals in it. The presence of valuable metals, namely precious and base metals, such as gold and copper, respectively also highlights...
Chapter
Full-text available
Various studies had successfully utilized graph theory analysis as a way to gain a high-level abstraction view of the software systems, such as constructing the call graph to visualize the dependencies among software components. The level of granularity and information shown by the graph usually depends on the input such as variable, method, class,...
Chapter
Water plays a major role in our digestion, absorption, transportation and use of nutrients. Research has shown that inadequate water consumption can cause health risk of urinary stone disease, cancers, salivary gland functions, childhood and adolescent obesity and individuals’ overall health. Therefore, daily adequate fluid intake is an important n...
Conference Paper
Full-text available
-System administrators can benefit from deploying Network Intrusion Detection Systems (NIDS) to find potential security breaches. However, security attacks tend to be unpredictable. There are many challenges to develop a flexible and effective NIDS in order to prevent high false alarm rates and low detection accuracy against unknown attacks. In thi...
Article
Full-text available
Network virtualization plays an important role in the modern Internet architecture. Various OpenFlow-based network slicing techniques have been proposed and implemented to achieve network virtualization. In this paper, we present a scalable network slicing technique to provide multi-tenant network slices over an OpenFlow-based Multi-Protocol Label...
Article
Full-text available
Effective debugging is necessary for producing high quality and reliable software. Fault localization plays a vital role in the debugging process. However, fault localization is the most tedious and expensive activity in program debugging, as such, effective fault localization techniques that can identify the exact location of faults is eminent. De...
Article
Full-text available
Constrained clustering or semi-supervised clustering has received a lot of attention due to its flexibility of incorporating minimal supervision of domain experts or side information to help improve clustering results of classic unsupervised clustering techniques. In the domain of software remodularisation, classic unsupervised software clustering...
Article
The energy dissipated as heat for each utilization level of a data center server is empirically measured and stored as the thermal-profile. These thermal-profiles are used to predict the outlet temperatures of the related servers for current and future utilization. The predicted outlet temperature is an important parameter for energy efficient ther...
Article
Full-text available
Modeling software systems using complex networks can be an effective technique for analyzing the complexity of software systems. To enhance the technique, the structure of a complex network can be extended by assigning a weight to the edges of the complex network to denote the strength of communicational cohesion between a pair of related software...
Conference Paper
Full-text available
Although agglomerative hierarchical software clustering technique has been widely used in reverse engineering to recover a high-level abstraction of the software in the case of limited resources, there is a lack of work in this research context to integrate the concept of pair-wise constraints, such as must-link and cannot-link constraints, to furt...
Article
Full-text available
The evolution in pedagogy and research has introduced new requirements in the educational sector. Ondemand computing resource provisioning, often referred as virtual lab, is one of the requirements in great demand. Most current virtual lab systems are proprietary and thus their detailed software architectures are not accessible to developers. The l...
Article
Context Software clustering is a key technique that is used in reverse engineering to recover a high-level abstraction of the software in the case of limited resources. Very limited research has explicitly discussed the problem of finding the optimum set of clusters in the design and how to penalize for the formation of singleton clusters during cl...
Article
Purpose This paper aims to describe the problems faced by MyAIS, an open access repository of scholarly content, the reasons for moving to a cloud infrastructure and the design of the system. Design/methodology/approach MyAIS is supported by an IBM HS22V multiple blade server using virtualization technology. A single blade server runs both MyAIS's...
Conference Paper
Discrete Event Simulation (DES) is a popular technique use in network simulation tools. Some of the popular queuing methods in DES are linked list, heap, splay tree and calendar based queue. Due to the design characteristic of discrete events and single sequential queue in DES, these queuing methods are unable to fully utilize the computing power o...
Article
Virtual lab has gained popularity among cloud computing practitioners due to its promise of on-demand provisioning of computer resources. However, lack of standardized guidelines hinders the adoption among educational institutions. Achievements of non-functional requirements possess greater challenge due to their qualitative nature. These requireme...

Network

Cited By