Mooi Choo Chuah

Mooi Choo Chuah
Lehigh University · Department of Computer Science and Engineering

PhD

About

173
Publications
18,697
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,466
Citations
Citations since 2017
32 Research Items
1748 Citations
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
Additional affiliations
January 2004 - present
Lehigh University
Position
  • Professor (Full)
October 1991 - December 2003
AT&T
Position
  • DMTS, Tech Manager
Education
September 1987 - May 1991
University of California, San Diego
Field of study
  • Electrical Engineering

Publications

Publications (173)
Chapter
In this paper, we tackle the problem of RGB-D Semantic Segmentation. The key challenges in solving this problem lie in 1) how to extract features from depth sensor data and 2) how to effectively fuse the features extracted from the two modalities. For the first challenge, we found that the depth information obtained from the sensor is not always re...
Preprint
Full-text available
Despite the advancement in the technology of autonomous driving cars, the safety of a self-driving car is still a challenging problem that has not been well studied. Motion prediction is one of the core functions of an autonomous driving car. Previously, we propose a novel scheme called GRIP which is designed to predict trajectories for traffic age...
Preprint
Full-text available
Nowadays, autonomous driving cars have become commercially available. However, the safety of a self-driving car is still a challenging problem that has not been well studied. Motion prediction is one of the core functions of an autonomous driving car. In this paper, we propose a novel scheme called GRIP which is designed to predict trajectories for...
Article
Recently, many researchers have conducted data mining over medical data to uncover hidden patterns and use them to learn prediction models for clinical decision making and personalized medicine. While such healthcare learning models can achieve encouraging results, they seldom incorporate existing expert knowledge into their frameworks and hence pr...
Article
The explosive usage of mobile devices enables conducting electronic transactions involving direct signature on such devices. Thus, user signature verification becomes critical to ensure the success deployment of online transactions such as approving legal documents and authenticating financial transactions. Existing approaches mainly focus on user...
Article
There is a growing trend for people to perform regular workouts in home/office environments because work-at-home people or office workers can barely squeeze in time to go to dedicated exercise places (e.g., gym). To provide personalized fitness assistance in home/office environments, traditional solutions, e.g., hiring personal coaches incur extra...
Preprint
Full-text available
Deploying a deep learning model on mobile/IoT devices is a challenging task. The difficulty lies in the trade-off between computation speed and accuracy. A complex deep learning model with high accuracy runs slowly on resource-limited devices, while a light-weight model that runs much faster loses accuracy. In this paper, we propose a novel decompo...
Preprint
Obesity is a serious public health concern world-wide, which increases the risk of many diseases, including hypertension, stroke, and type 2 diabetes. To tackle this problem, researchers across the health ecosystem are collecting diverse types of data, which includes biomedical, behavioral and activity, and utilizing machine learning techniques to...
Article
Advances in machine learning (ML) in recent years have enabled a wide range of applications such as data analytics, autonomous systems, and security diagnostics. For example, recurrent neural networks (RNNs), such as long short-term memory networks (LSTMs), serve as a fundamental building block for many sequence learning tasks. Many researchers con...
Article
Full-text available
Designing a scheme that can achieve a good performance in predicting single person activities and group activities is a challenging task. In this paper, we propose a novel robust and efficient human activity recognition scheme called ReHAR, which can be used to handle single person activities and group activities prediction. First, we generate an o...
Chapter
Many state-of-the-art image retrieval systems include a re-ranking step to refine the suggested initial ranking list so as to improve the retrieval accuracy. In this paper, we present a novel 2-stage k-NN reranking algorithm. In stage one, we generate an expanded list of candidate database images for re-ranking so that lower ranked ground truth ima...
Article
Clinical data mining has great potential for mining hidden patterns in the medical datasets, which can then be used to guide clinical decision making and personalized medicine. While several studies have merged medical data mining techniques with statistical analysis, their proposed mechanisms are excessively complex and are not particularly accura...
Conference Paper
The rapid pace of urbanization and socioeconomic development encourage people to spend more time together and therefore monitoring of human dynamics is of great importance, especially for facilities of elder care and involving multiple activities. Traditional approaches are limited due to their high deployment costs and privacy concerns (e.g., came...
Article
This paper introduces a novel electricity retail pricing scheme we designate Generalized Minimax (GenMinimax). GenMinimax is characterized by three rate zones with the narrowest in the middle, called threshold band, constituting the attraction zone where the lowest rate is charged. The scheme is designed so that the threshold band envelops a negoti...
Conference Paper
The electric grid's capital and operational expenses are significantly affected by the peak power demands. In an effort to reduce peak electricity demands, electricity market analysts and researchers have designed different pricing schemes that provide a certain incentive to end-users to reduce their usage during what is considered as peak hours. A...
Conference Paper
Affordable cloud computing technologies allow users to efficiently store, and manage their Personal Health Records (PHRs) and share with their caregivers or physicians. This in turn improves the quality of healthcare services, and lower health care cost. However, serious security and privacy concerns emerge because people upload their personal info...
Article
Many state-of-the-art image retrieval systems include a re-ranking step to refine the suggested initial ranking list so as to improve the retrieval accuracy. In this paper, we present a novel 2-stage k-NN re-ranking algorithm. In stage one, we generate an expanded list of candidate database images for re-ranking so that lower ranked ground truth im...
Conference Paper
Children/Adolescents with Autism Spectrum Disorder (ASD) demonstrate communication skill deficits and often do not utilize appropriate turn-taking in conversations. Several intervention strategies have been designed to improve conversational skills, but assessing conversations and determining strategy effectiveness often prove to be complicated and...
Article
A key component of a smart grid is its ability to collect useful information from a power grid for enabling control centers to estimate the current states of the power grid. Such information can be delivered to the control centers via wireless or wired networks. It is envisioned that wireless technology will be widely used for local-area communicat...
Conference Paper
Reducing peak demand is critically important in smartgrid as a significant fraction of the electric grids capital and operational expenses is affected by the peak power demands. Time of Use (ToU) and Real Time Pricing (RTP) pricing schemes have been used by power system operators to incentivize cus- tomers to reduce their peak energy demands during...
Article
Full-text available
Recently, researchers have proposed solutions to build ondevice mobile visual search (ODMVS) systems. Different from traditional client-server mobile visual search systems, an ODMVS supports image searching directly within a mobile device. An ODMVS needs to be designed with constrained hardware in mind e.g. limited memory, less powerful CPU. In thi...
Conference Paper
Full-text available
Recent advances in visual tracking have focused on handling deformations and occlusions using the part-based appearance model. However, it remains a challenge to come up with a reliable target representation using local parts, and hence existing trackers continue to face drifting problems. To deal with this challenge, we propose a robust online mod...
Article
New mobile phones equipped with multiple sensors provide users with the ability to sense the world at a microscopic level. The collected mobile sensing data can be comprehensive enough to be mined not only for the understanding of human behaviors but also for supporting multiple applications ranging from monitoring/tracking, to medical, emergency a...
Conference Paper
Recent studies show that autistic children tend to speak and interact more in the presence of an interactive robot. Unfortunately, most of the robotic experiments were conducted in highly controlled clinical settings or limited selected home environments due to the high deployment cost. In this paper, we design a low-cost interactive robot that can...
Conference Paper
Full-text available
This paper investigates the routing protocol in smart phone-based mobile Ad-Hoc networks. We introduce a new dual radio communication model, where a long-range, low cost, and low rate radio is integrated into smart phones to assist regular radio interfaces such as WiFi and Bluetooth. We propose to use the long-range radio to carry out small managem...
Article
In this panel, the panel members will discuss future research trends in mobile augmented reality. In particular, we will focus on the design challenges of mobile augmented reality (MAR) platform e.g. real-time augmented reality that can help vulnerable populations; augmented reality in medical surgery and applications, and use of MAR in education....
Conference Paper
Augmented reality technologies allow 3D rendering of media-rich contents which can further be embedded within users' view of the world around them. In this demo, we present our Lehigh Explorer Augmented Campus Tour application which uses new content centric network features we designed. Users submit keyword-based queries to retrieve relevant multim...
Article
Full-text available
Mobile wireless devices play important roles in our daily life, e.g., users often use such devices to take pictures and share with friends via opportunistic peer-to-peer links, which however are intermittent in nature, and hence require the store-and-forward feature proposed in Delay Tolerant Networks to provide useful data sharing opportunities. M...
Conference Paper
With the availability of powerful mobile devices and cellular or WiFi networks with larger bandwidth, users can search and retrieve contents everywhere anytime. Recently content-centric networks have been proposed to provide users with more flexible access to contents than the existing IP-based networks. We have designed secure content centric mobi...
Conference Paper
A key component of a smart grid is its ability to collect useful information from a power grid for enabling control centers to estimate the current states of the power grid. Such information can be delivered to the control centers via wireless or wired networks. We envision that wireless technology will be widely used for local-area communication s...
Conference Paper
The rapid deployment of sensing technology in smartphones and the explosion of their usage in people's daily lives provide users with the ability to collectively sense the world. This leads to a growing trend of mobile healthcare systems utilizing sensing data collected from smartphones with/without additional external sensors to analyze and unders...
Conference Paper
Full-text available
The emergence of powerful mobile devices have allowed users to publish more contents in the Internet in recent years. The existing Internet architecture cannot cope with such exponential growth in users published contents. Content-centric networks have been proposed recently to allow future Internet to be data-centric rather than network centric. S...
Conference Paper
Mobile wireless devices (e.g., smartphones, PDAs, and notebooks) play important roles in our daily life, e.g., users often use such devices for bank transactions, keep in touch with friends. Users can also store such information and share with one another via opportunistic peer to peer links. However, peer to peer links are opportunistic links whic...
Conference Paper
Full-text available
In this paper, we present a smart phone dual defense protection framework that allows Official and Alternative Android Markets to detect malicious applications among those new applications that are submitted for public release. Our framework consists of servers running on clouds where developers who wish to release their new applications can upload...
Conference Paper
Autism currently affects 1 in every 88 American children impairing their social interactions, communications and daily living. Often, parents, educators, and researchers need to purchase expensive equipment to help autistic children cope with challenges in their daily living. In this paper, we present the Smartphone-Based Autism Social Alert (SASA)...
Conference Paper
The inclusion of embedded sensors in mobile phones, and the explosion of their usage in people's daily lives provide users with the ability to collectively sense the world. The collected sensing data from such a mobile phone enabled social network can be mined for users' behaviors and their social communities, and to support a broad range of applic...
Conference Paper
Smartphones these days are equipped with many embedded sensors which enable new applications across different domains, namely healthcare, environmental monitoring, social networks, and transportation. In our previous work, we developed a location-based Android-based application called Fitness Tour for combating obesity. In this poster, we present a...
Conference Paper
Full-text available
The electric power grid is a crucial infrastructure in our society and is always a target of malicious users and attackers. In this paper, we first introduce the concept of unidentifiable attack, in which the control center cannot identify the attack even though it detects its presence. Thus, the control center cannot obtain deterministic state est...
Article
Full-text available
The electric power grid is a crucial infrastructure in our society and is always a target of malicious users and attackers. In this paper, we first introduce the concept of unidentifiable attack, in which the control center cannot identify the attack even though it detects its presence. Thus, the control center cannot obtain deterministic state est...
Article
Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. Recently, network coding schemes for DTN have been propos...
Conference Paper
Full-text available
Community association is an important attribute of a social network because people may belong to varying groups with different characteristics at different times. Traditional community detection approaches often rely on a centralized server and are only useful for offline data analysis. In this paper, we propose and evaluate a distributed community...
Conference Paper
Rapid advancements of wireless technologies allow users to access real-time data, and stay connected with friends and business while they are on the move. However, most emerging mobile applications assume users have cellular data services, and hence not everyone can enjoy new mobile applications. In addition, some emerging mobile applications e.g....
Article
Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. In the past, we have designed ferry based scheme for inte...
Conference Paper
Full-text available
New mobile phones equipped with multiple sensors provide users with the ability to sense the world at a microscopic level. The collected mobile sensing data can be comprehensive enough to be mined not only for the understanding of human behaviors but also for supporting multiple applications ranging from monitoring/tracking, to medical, emergency a...
Conference Paper
Social networking sites have become very popular in recent years. Users use them to find new friends, updates their existing friends with their latest thoughts and activities. Among these sites, Twitter is the fastest growing site. Its popularity also attracts many spammers to infiltrate legitimate users’ accounts with a large amount of spam messag...
Conference Paper
Full-text available
Unlike other types of malware, botnets are characterized by their command and control (C&C) channels, through which a central authority, the botmaster, may use the infected computer to carry out malicious activities. Given the damage botnets are capable of causing, detection and mitigation of botnet threats are imperative. In this paper, we present...
Conference Paper
As Cloud Computing technology becomes more mature, many organizations and individuals are interested in storing more sensitive data e.g. personal health records, customers related information in the cloud. Such sensitive data needs to be encrypted before it is outsourced to the cloud. Typically, the cloud servers also need to support a keyword sear...
Conference Paper
Powerful wireless devices carried by humans can form human contact-based networks. Such networks often suffer from intermittent connectivity. Thus, providing an effective information dissemination feature in such networks is very important. In this paper, we explore a cooperative user centric information dissemination scheme which allows published...
Conference Paper
Full-text available
Network security topics are gaining importance but they are often taught using traditional, passive methods via lec-tures and textbooks. This paper describes our efforts to change this situation by developing teaching materials and technical support for use of network testbeds in security ed-ucation. This practice cannot replace the traditional tea...
Article
Smartphones today not only provide computing and communication capabilities but are also equipped with many sensors that enable new applications across several domains, namely healthcare, environmental monitoring, social networks, and transportation. In this paper, we focus on the heathcare domain. We describe a location-based application called Fi...
Article
In this work, we investigate the feasibility and effectiveness of using human contact traces collected from mobile phones to derive social community information to reduce the disease propagation rate in the healthcare domain. Our trace-driven simulation results showed that our scheme is highly effective, and thus opens more opportunities for utiliz...
Article
Full-text available
Delay-tolerant networks are especially useful in providing mission-critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which relays them locally into the network. Wormh...
Chapter
With the advancement in technology, many users carry wireless computing de-vices e.g., PDAs, cell-phones etc. Such devices can form mobile ad hoc networks and communicate with one another via the help of intermediate nodes. Such ad hoc networks are very useful in several scenarios e.g., battlefield operations, vehicular ad hoc networks and disaster...
Conference Paper
Recently, multichannel protocols have been proposed and shown to significantly improve the aggregate throughput compared to single channel protocols. However, some existing proposals still suffer from low channel utilization or unfair bandwidth allocation between different flows in a multihop wireless network. In this paper, we design an asynchrono...
Conference Paper
Full-text available
The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditio...
Conference Paper
Full-text available
The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the node to launch harmful attacks in the networks. The traditional detection approaches of secure routing protocols can not address such kind of insider attacks in DTNs. In this...
Article
Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. A key feature of DTN technology is the late-binding capab...
Article
Some ad hoc network scenarios are characterized by frequent partitions and intermittent connectivity. Hence, existing adhoc routing schemes that assume that an end-to-end path exists from a source to a destination do not work in such challenging environment. A store-and-forward network architecture known as the disruption tolerant network (DTN) has...
Article
Disruption Tolerant Networks (DTNs) technologies are emerging solutions to networks that experience frequent partitions. As a result, multicast design in DTNs is a considerably more difficult problem compared to that in Internet and mobile ad hoc networks. In this paper, we first investigate three basic DTN multicast strategies, including unicast-b...
Conference Paper
Full-text available
Some ad hoc network scenarios are characterized by frequent partitions and intermittent connectivity. A store-and-forward network architecture known as the disruption tolerant network (DTN) has been designed for such challenging network environments. To further improve the delivery performance, some researchers have proposed some network coding sch...