default search action
Mee Hong Ling
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c9]Muhammed Basheer Jasser, Lee Ming Zhen, Bayan Issa, Mee Hong Ling, Ismail Ahmed Al-Qasem Al-Hadi:
Quantifying Object-Oriented System Complexity: Introducing a Powerful Measurement Tool. ICSET 2023: 221-226 - 2022
- [j10]Mohammad Kazem Chamran, Kok-Lim Alvin Yau, Mee Hong Ling, Yung-Wey Chong:
A Hybrid Route Selection Scheme for 5G Network Scenarios: An Experimental Approach. Sensors 22(16): 6021 (2022) - [c8]Abdikarim Mohamed Ibrahim, Kok-Lim Alvin Yau, Mee Hong Ling:
Implications of Centralized and Distributed Multi-Agent Deep Reinforcement Learning in Dynamic Spectrum Access. ISTT 2022: 62-67 - [c7]Abdurraheem Joomye, Mohammad Tahir, Muhammad Aman Sheikh, Mee Hong Ling, Kian Meng Yap:
Performance Analysis of Federated Learning in wireless networks. ISTT 2022: 68-73 - 2021
- [j9]Kok-Lim Alvin Yau, HeeJeong Jasmine Lee, Yung-Wey Chong, Mee Hong Ling, Aqeel Raza Syed, Celimuge Wu, Hock Guan Goh:
Augmented Intelligence: Surveys of Literature and Expert Opinion to Understand Relations Between Human Intelligence and Artificial Intelligence. IEEE Access 9: 136744-136761 (2021) - 2020
- [j8]Israr Ahmad, Kok-Lim Alvin Yau, Mee Hong Ling, Sye Loong Keoh:
Trust and Reputation Management for Securing Collaboration in 5G Access Networks: The Road Ahead. IEEE Access 8: 62542-62560 (2020) - [j7]Kok-Lim Alvin Yau, Shuhong Peng, Junaid Qadir, Yeh-Ching Low, Mee Hong Ling:
Towards Smart Port Infrastructures: Enhancing Port Activities Using Information and Communications Technology. IEEE Access 8: 83387-83404 (2020)
2010 – 2019
- 2019
- [j6]Anita Latsmi Manohar, Kok-Lim Alvin Yau, Mee Hong Ling, Suleman Khan:
A Security-Enhanced Cluster Size Adjustment Scheme for Cognitive Radio Networks. IEEE Access 7: 117-130 (2019) - [j5]Mee Hong Ling, Kok-Lim Alvin Yau, Junaid Qadir, Qiang Ni:
A Reinforcement Learning-Based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 5(1): 28-43 (2019) - [c6]Mee Hong Ling, Kok-Lim Alvin Yau:
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks. ICOIN 2019: 296-300 - 2018
- [j4]Kok-Lim Alvin Yau, Junaid Qadir, Celimuge Wu, Muhammad Ali Imran, Mee Hong Ling:
Cognition-Inspired 5G Cellular Networks: A Review and the Road Ahead. IEEE Access 6: 35072-35090 (2018) - 2017
- [j3]Kok-Lim Alvin Yau, Junaid Qadir, Hooi Ling Khoo, Mee Hong Ling, Peter Komisarczuk:
A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control. ACM Comput. Surv. 50(3): 34:1-34:38 (2017) - 2016
- [c5]Kok-Lim Alvin Yau, Sian Lun Lau, Hui Na Chua, Mee Hong Ling, Vahab Iranmanesh, Shwu Chen Charis Kwan:
Greater Kuala Lumpur as a smart city: A case study on technology opportunities. KST 2016: 96-101 - 2015
- [j2]Mee Hong Ling, Kok-Lim Alvin Yau, Junaid Qadir, Geong Sen Poh, Qiang Ni:
Application of reinforcement learning for security enhancement in cognitive radio networks. Appl. Soft Comput. 37: 809-829 (2015) - 2014
- [j1]Mee Hong Ling, Kok-Lim Alvin Yau, Geong Sen Poh:
Trust and reputation management in cognitive radio networks: a survey. Secur. Commun. Networks 7(11): 2160-2179 (2014) - [c4]Mee Hong Ling, Kok-Lim Alvin Yau:
Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks. ICITST 2014: 256-261 - 2013
- [c3]Mee Hong Ling, Kok-Lim Alvin Yau:
Reinforcement Learning-Based Trust and Reputation Model for Spectrum Leasing in Cognitive Radio Networks. ICITCS 2013: 1-6 - 2012
- [c2]Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling:
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks. SIN 2012: 41-46 - 2010
- [c1]Mee Hong Ling, Wan Haslina Hassan:
Harnessing ANN for a Secure Environment. ISNN (2) 2010: 540-547
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint