Penny Chong
Title
Cited by
Cited by
Year
Mouse authentication without the temporal aspect–what does a 2d-cnn learn?
P Chong, YXM Tan, J Guarnizo, Y Elovici, A Binder
2018 IEEE Security and Privacy Workshops (SPW), 15-21, 2018
202018
User authentication based on mouse dynamics using deep neural networks: A comprehensive study
P Chong, Y Elovici, A Binder
IEEE Transactions on Information Forensics and Security 15, 1086-1101, 2019
192019
ImageCLEF 2017: ImageCLEF Tuberculosis Task-the SGEast Submission.
J Sun, P Chong, YXM Tan, A Binder
CLEF (Working Notes), 2017
132017
A novel pedestrian detection and tracking with boosted HOG classifiers and Kalman filter
P Chong, YH Tay
2016 IEEE Student Conference on Research and Development (SCOReD), 1-5, 2016
72016
Simple and effective prevention of mode collapse in deep one-class classification
P Chong, L Ruff, M Kloft, A Binder
2020 International Joint Conference on Neural Networks (IJCNN), 1-9, 2020
52020
Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques
I Sadek, P Chong, SU Rehman, Y Elovici, A Binder
Data in brief 26, 104437, 2019
12019
Pedestrian Detection and Tracking in Surveillance Video
P Chong
UTAR, 2016
12016
Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity
YXM Tan, P Chong, J Sun, Y Elovici, A Binder
arXiv preprint arXiv:2012.06330, 2020
2020
Towards Scalable and Unified Example-based Explanation and Outlier Detection
P Chong, NM Cheung, Y Elovici, A Binder
arXiv preprint arXiv:2011.05577, 2020
2020
Journal Pre-proof 墨 3.2.
I Sadek, P Chong, SU Rehman, Y Elovici, A Binder
Journal Pre-proof 墨 3, 1, 0
SPW 2018
N Carlini, D Wagner, J Saxe, R Harang, C Wild, H Sanders, P Chong, ...
The system can't perform the operation now. Try again later.
Articles 1–11