Peter Loh

Peter Loh

Associate Professor

Singapore Institute of Technology

Publications

  Journal Papers
  • X. Zhao, C.S. Veerappan, P. Loh, and C. Wee, “Towards Cross-platform Detection of Cyber-Attacks Using Micro-agents,” International Journal of Cyber-Security and Digital Forensics, vol. 8, issue 2, pp. 108-119, June 2019.

  • H.T. Le, P.K.K. Loh, and C.T. Lau, “Performance Evaluation of Cyber Reconnaissance Tools,” International Journal of Information Privacy, Security & Integrity, 2016.

  • P.K.K. Loh, C. T. Lau, and B.H. Chan, “Intelligent Widget Reconfiguration for Mobile Phones,” Journal of Emerging Trends in Computing and Information Sciences, vol. 2, no. 9, pp. 413-426, Sept 2011.

  • P.K.K. Loh and D. Subramanian, “Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 613-624, Dec 2010.

  • P.K.K. Loh, Yi Pan, and W.J. Hsu, “Performance Evaluation of Efficient and Reliable Routing Protocols for Fixed-Power Sensor Networks,” IEEE Transactions on Wireless Communications, vol. 8, issue 5, pp. 2328-2335, May 2009.

  • P.K.K. Loh and Yi Pan, “An Energy-Aware Clustering Approach for Wireless Sensor Networks,” Intl Journal of Communications, Network and System Sciences, vol. 2, no. 2, pp. 131-141, May 2009.

  • D. Subramanian, H.T. Le, and P.K.K. Loh, “Assuring Quality in Vulnerability Reports for Security Risk Analysis,” International Journal on Advances in Security, vol. 2, no. 2 & 3, pp. 226-241, Nov 2009.

  • P.K.K. Loh and Edmond C. Prakash, “Novel Moving Target Search Algorithms for Computer Gaming,” ACM Computers in Entertainment, vol. 7, issue 2, June 2009.

  • Y. Chong, C. Quek, and P.K.K. Loh, “A novel neuro-cognitive approach to modeling traffic control and flow based on fuzzy neural techniques,” Expert Systems With Applications, June 2008.

  • P.K.K. Loh and Edmond C. Prakash, “Performance Simulations of Moving Target Search Algorithms,” International Journal of Computer Games Technology, Sept 2008.

  • P.K.K.Loh, W.J Hsu, and Yi Pan, “Reliable and Efficient Communications in Sensor Networks,” Journal of Parallel and Distributed Computing, vol. 67, no. 8, pp. 922-934, Aug 2007.

  • P.K.K.Loh, W.J.Hsu, and Yi Pan, “The Exchanged Hypercube,” IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 9, pp. 866-874, Sep 2005.

  • P.K.K.Loh, W.J.Hsu, “The Josephus Cube: Analysis of Routing and Fault Tolerance,” Journal of Parallel and Distributed Computing, vol. 65, issue 1, pp. 58-64, 2005.

  • P.K.K.Loh, W.J.Hsu, “Fault-Tolerant Routing for Complete Josephus Cubes,” Parallel Computing, 2004, vol. 30, no. 9-10, pp. 1151-1167.

  • P.K.K.Loh, W.J.Hsu, “Fault Tolerance of Complete Josephus Cubes,” Journal of Systems Architecture, 2003.

  • P.K.K.Loh, W.J.Hsu, and A.Omondi, “Embedding of Fault-Tolerant Trees in the Josephus Cube,” Australian Comp Science Comms, vol. 24, no. 3, pp. 17-27, February 2002.

  • P.K.K.Loh and V.Shaw, “A genetic-based fault-tolerant routing strategy for multiprocessor networks,” Future Generation Computer Systems, January 2001, vol. 17, no. 4, pp. 415-423.

  • P.K.K.Loh, W.J.Hsu, “Embedding of Fault Tolerant Trees in the Josephus Cube,” Parallel Processing Letters, 2001.

  • P.K.K.Loh, W.J.Hsu, “Fault-Tolerant Communications on Hypercube-Clusters,” Journal of Interconnection N/ws, 2000, vol. 1, no. 4, pp. 315-329.

  • P.K.K.Loh, W.J.Hsu, “The Josephus Cube: A novel interconnection network,” Parallel Computing, 2000, vol. 26, pp. 427-453.

  • P.K.K.Loh, H.G.Singh, and C.K.Chia, “Virtual Prototyping of Cellular Phones,” Software Practice & Experience, 1999, vol. 29, no. 10, pp. 897-929.

  • P.K.K.Loh, W.T.Cai, “Effects of Topology and Buffering on a Processor Farm,” Microprocessors and Microsystems, vol. 22, no. 7, pp. 363-372, Jan 1999.

  • P.K.K.Loh, W.Abdul, “A Fault Tolerant Communications Switch Prototype,” Microelectronics and Reliability, Elsevier Science, vol. 37, no. 8, pp. 1193-1196, 1997.

  • P.K.K.Loh, W.J. Hsu, “Dynamic Load Balancing on Multiprocessor Networks,” International Journal of Computer Systems Science and Engineering, Elsevier Science, vol. 12, no. 6, pp. 369-372, 1997.

  • P.K.K.Loh, W.J.Hsu, W.T.Cai, N.Sriskanthan, “How Network Topology Affects Dynamic Load Balancing,” IEEE Parallel & Distributed Technology: Systems & Applications (IEEE Computer Soc), Fall Issue, 1996, pp. 25-35.

  • P.K.K.Loh, “Artificial Intelligence Search Techniques as Fault-Tolerant Routing Strategies,” Parallel Computing, 1996, vol. 22, pp. 1127-1147.

  • N.Sriskanthan, P.K.K.Loh, K.H.Lee, and Y.C.Chang, “A Real-time Video Phone System on ISDN/LAN,” IEEE Transactions on Consumer Electronics, vol. 41, no. 2, pp. 332-342, 1995.

  • P.K.K.Loh, “Heuristic Fault-Tolerant Routing Strategies for a Multiprocessor Network,” Microprocessors and Microsystems, vol. 19, no. 10, pp. 591-597, 1995.

  • N.Sriskanthan, A.Das, P.K.K.Loh, and A.H.Leong, “An Adaptive Switching Architecture for Multiprocessor Networks,” Microprocessors and Microsystems, vol. 18, no. 6, pp. 307-314, 1994.

  Conference Papers
  • Mohammad Shameel bin Mohammad Fadilah, Vivek Balachandran, Peter Loh, and Melissa Chua, “DRAT: A Drone Attack Tool for Vulnerability Assessment,” 10th ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 2020.

  • X. Zhao, C.S. Veerappan, P.K.K. Loh, Z. Tang, and F. Tan, “Multi-Agent Cross-Platform Detection of Meltdown and Spectre Attacks,” 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), Nov 2018.

  • Z. Tang, P. Loh, F. Tan, and Caleb Wee, “Tackling New or Unexpected Challenges in Project-based Learning: the LEARN Model for Facilitators,” CSEIT 2018, July 2018.

  • C. Veerappan, P. Loh, Z. Tang, and F. Tan, “Taxonomy on Malware Evasion Countermeasures Techniques,” 4th IEEE World Forum on Internet of Things, Singapore, May 2018.

  • P.K.K.Loh, “Cells – A Novel IOT Security Approach,” IEEE TENCON 2016 – Technologies for Smart Nation, November 2016.

  • H.T. Le and P.K.K. Loh, “Identification of Performance Issues in Contemporary Black-Box Web Application Scanners in SQLI,” 1st International Conference on Computing, Information Systems and Communications (CISCO’12), Singapore, May 2012.

  • H.T. Le and P.K.K. Loh, “Using Natural Language Tool to Assist VPRG Automated Extraction from Textual Vulnerability Description,” The 25th International Conference on Advanced Information Networking and Applications (AINA 2011), pp 586 – 592, March 2011, Singapore.

  • X. Li, P.K.K. Loh, and Freddy Tan, “Mechanisms of Polymorphic and Metamorphic Viruses,” Proc. Of European Intelligence and Security Informatics Conference (EISIC), pp 149 – 154, Sept 2011, Athens, Greece.

  • D. Subramanian, H.T. Le, P.K.K. Loh, and A.B. Premkumar, “An Empirical Vulnerability Remediation Model,” IEEE WCNIS 2010, pp 376-380, June 2010, China.

  • H.T. Le, P.K.K. Loh, and W.J. Hsu, “Using Graph Similarity Algorithm to Recognize Vulnerability Property Matching in VPRG Model,” The 2010 International Congress on Computer Applications and Computational Science (CACS 2010), 4-6 Dec 2010, Singapore.

  • H.T. Le, D. Subramanian, W.J. Hsu, and P. K. K. Loh, “Scoring Web-based Vulnerability Impact using Property-Based Vulnerability Model,” 6th Intl Symposium on Web and Mobile Information Services (WAMIS 2010), pp 431-436, Apr 2010, Perth, Australia.

  • D. Subramanian, H.T. Le, P.K.K. Loh, and A.B. Premkumar, “Quantitative Evaluation of Related Web-based Vulnerabilities,” 4th IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI2010), pp 118-125, 9-11 June 2010, Singapore.

  • H.T. Le, D. Subramanian, W.J. Hsu, and P.K.K. Loh, “An Empirical Property-Based Model for Vulnerability Analysis and Evaluation,” IEEE Asia-Pacific Services Computing Conference (APSCC 2009), pp 40-45, Dec 2009, Singapore.

  • C. D. Subramanian, H.T. Le, and P.K.K. Loh, “Fuzzy Heuristic Design For Diagnosis Of Web-Based Vulnerabilities,” 4th International Conference on Internet Monitoring and Protection (ICIMP ’09), pp 103-108, May 2009, Venice, Italy.

  • N.M. Wardhana, H. Johan, P.K.K. Loh, H.S. Seah, and D.W.S. Ong, “Efficient Connection Graph Generation for Waypoints in Virtual Environments,” International Conference & Symposium on Computer Games; Animation, Multimedia, IPTV, Edutainment & Security, May 2009.

  • P.K.K.Loh, R. Bhasker, and E.C. Prakash, “Heuristic-Based Learning in Abstraction Moving Target Search,” International Conference & Symposium on Computer Games; Animation, Multimedia, IPTV, Edutainment & Security, May 2009.

  • H.T. Le and P.K.K. Loh, “Realizing Web Application Vulnerability Analysis via AVDL,” Proc. 10th Intl Conf on Enterprise Information Systems (ICEIS 2008), pp 259-265, June 2008, Barcelona, Spain.

  • P.K.K.Loh and H.P. Ranjali, “Study of Moving Target Search Algorithms in Gaming Scenarios,” Intl Conf. & Industry Symposium on Computer Games; Animation, Multimedia, IPTV, Edutainment & Security, 2008.

  • H.T. Le and P.K.K. Loh, “Evaluating AVDL Descriptions for Web Application Vulnerability Analysis,” IEEE International Conference on Intelligence and Security Informatics (ISI 2008), pp 279-281, June 2008, Taipei, Taiwan.

  • H.T. Le and P.K.K. Loh, “Unified Approach to Vulnerability Analysis of Web Applications,” Proc. Intl e-Conf on Computer Science 2007 (IeCCS 2007) Part II, Dec 2007.

  • P.K.K.Loh, “Localized Metrics vs Broadcasting in Wireless Sensor Networks,” Proc. 14th IEEE International Conference on Networks (ICON’06), Vol. 2, pp 1-5, Sep 2006, Singapore.

  • P.K.K.Loh, “A Standalone Printing USB Host Device Prototype,” IEEE Asia Pacific Conference on Circuits and Systems, pp 1915-1918, Dec 2006.

  • P.K.K.Loh, S. H. Long, and Yi Pan, “An Efficient and Reliable Routing Protocol for Wireless Sensor Networks,” IEEE 6th Intl Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2005), pp 512-516, June 2005.

  • P.K.K.Loh and A. Lee, “Medical Informatics System with Wireless Sensor Network-enabled for Hospitals,” Intl Conf on Intelligent Sensors, Sensor Networks and Information Processing, Vol. 2005, pp 265-270, Dec 2005, Melbourne, Australia.

  • X Zhang and P.K.K.Loh, “A Fault-tolerant Routing Strategy for Fibonacci-class Cubes,” Proc. 10th Asia-Pacific Computer Systems Architecture Conf. (APCSAC 2005), 2005.

  • P.K.K.Loh, K. Y. Law*, K.Y.Chan, “A Study of Emerging Game Design and Interaction Methods,” Cybergames 2005: International Workshop on Games Development and Research, 2005.

  • P.K.K. Loh, S.H. Long, and Yi Pan, “A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks,” Proc. 10th IFIP Intl Conference on Personal Wireless Communications (PWC 2005), pp 19 – 26, Aug 2005, Colmar, France.

  • C.K.Kwoh, J.M. Hou, and P.K.K.Loh, “HaBDiT: Handy Biological Data Integration Tools,” International Joint Conference of InCoB, AASBi and KSBI (BIOINFO2005), 2005, Pusan, Korea.

  • P.K.K.Loh, E.C.Prakash, and W.T.Cai, “Simulating Target Explosions in Metal Wars,” Cybergames 2005, International Workshop on Games Development and Research, 2005.

  • P.K.K.Loh, S. Phong*, W.T.Cai, K.Y.Chan, “Multiplayer Internet Gaming with VRML: A Relook,” International Conference on Advances in Computer Entertainment Technology, 2004.

  • Loh Sau Meng Kelvin*, E.C.Prakash, K.K.Loh, “Design and Development of a Peer-To-Peer Online Multiplayer Game Using DirectX and C#,” Proc. of IEEE Tencon 2004, 2004.

  • P.K.K.Loh and E.C.Tan, “Digital comparator for non-algorithmic routing,” Proc. 2003 Joint Conference of the Fourth International Conference on Information, Communications & Signal Processing and Fourth Pacific-Rim Conference on Multimedia, Vol. 3, pp 1949-1951, May 2004, Singapore.

  • P.K.K.Loh, E.C.Prakash, “Trials and Tribulations of Metal Wars - a Multiplayer Internet Game,” MAAP 2004 Conference, 2004.

  • P.K.K.Loh and W.J.Hsu, “Design of Viable Fault-Tolerant Routing Strategy for Optical-based Grids,” International Symposium on Parallel and Distributed Processing and Applications (ISPA 2003), Vol 2745, pp 112 - 126, July 2003, Aizu, Japan.

  • P.K.K.Loh and W.J.Hsu, “A Fault-Tolerant Routing Strategy for Complete Josephus Cubes,” Proc. 15th IASTED Parallel and Distributed Computing and Systems (PDCS 2003), Vol. I, November 2003, Marina del Ray, USA.

  • P.K.K.Loh and X. Zhang, “A Fault-Tolerant Routing Strategy for Gaussian Cube Using Gaussian Tree,” Intl Conference on Parallel Processing Workshops (ICPPW ’03), pp 305- , October 2003, Kaosiung, China.

  • P.K.K.Loh, W.J.Hsu, and A.Omondi, “Embedding of Fault-Tolerant Trees in the Josephus Cube,” CRPIT ’02 Proc. 7th Asia-Pacific Conference on Computer Systems Architecture, pp 17-27, 2002, Melbourne, Australia.

  • P.K.K.Loh, H. Schröder, and W.J.Hsu, “Fault-Tolerant Routing on Complete Josephus Cubes,” Proceedings of the 6th Australasian Computer Systems Architecture Conference (ACSAC ’01), Vol 23, No. 4, pp. 95-104, 2001, Queensland, Australia.

  • P.K.K. Loh and W.J. Hsu, “Fault-tolerant Fuzzy Communications on 3D-Mesh Networks,” 3rd International Conference on Information, Communications & Signal Processing (ICICS 2001), October 2001.

  • E.C.Tan and P.K.K.Loh, “Processor-farm model for parallel computation of fixed-polarity Reed-Muller expansions,” Proc. IEEE Region Ten Conference (TENCON 2000) - Intelligent Systems and Technology for the New Millennium, Vol 2, pp. 1-3, September 2000, Kuala Lumpur, Malaysia.

  • P.K.K.Loh and V.Shaw, “A Genetic-Based Fault-Tolerant Routing Strategy for Multiprocessor Networks,” 2nd Workshop on Bio-Inspired Solutions to Parallel Processing Problems, April 1999, USA.

  • P.K.K.Loh and W.J.Hsu, “A Cost-Effective Fault-Tolerant Router for Hypercube Clusters,” 8th Int’l Symp. on Integrated Circuits, Devices & Systems, Dec 1999.

  • P.K.K.Loh and W.J.Hsu, “The Josephus Cube: A Large Family of Hypercubic Interconnection Networks,” Proc. 2nd IASTED International Conference on Parallel and Distributed Computing and Networks, pp. 176-181, December 1998, Brisbane, Australia.

  • P.K.K.Loh and W.J.Hsu, “A Viable Optical Bus-Based Interconnection Network,” 2nd Int’l Conf. on Information, Communications & Signal Processing, 1999.

  • P.K.K.Loh, A. Wahab, and W.J.Hsu, “A Grouped Adaptive Packet-Switched Communications Model,” Joint Conference of 4th Asia-Pacific Conference on Communications/6th Int’l Conference on Communication Systems, 1998.

  • W.T.Cai and P.K.K.Loh, “Effects of Topology and Buffering on a Communications-Enhanced Processor Farm,” 3rd High Performance Computing Asia Conference (HPC Asia'98), pp. 486-494, 1998.

  • P.K.K.Loh and W.J.Hsu, “Fault-Tolerant Load Balancing Via Dynamic Switching,” High Performance Computing Asia Conference, 1998.

  • P.K.K.Loh and W.J.Hsu, “Fault-Tolerant Load Balancing Via Dynamic Switching,” Proceedings of the High Performance Computing Conf, Vol 2, pp. 1439-1449, 1998.

  • P.K.K.Loh and W.J.Hsu, “Performance Analysis of Fault-Tolerant Interval Routing,” Proc. ISCA 11th International Conf. on Parallel and Distributed Computing Systems, pp. 274-281, September 1998, Chicago-Illinois, USA.

  • P.K.K.Loh and E.C.Tan, “Design of A Fuzzy-Logic Router,” Proceedings of IEEE Asia-Pacific Conference on communications and 6th Singapore International Conference on Communications, Vol 2, pp. 575-579, 1998.

  • P.K.K.Loh and W. J. Hsu, “Adaptive, Fault-Tolerant, Deadlock-Free and Livelock-Free Interval Routing in Mesh Networks,” Proc. IEEE 2nd Intl Conf on Algos and Architectures for Parallel Processing, pp 348-355, 1996.

  • P.K.K.Loh, Q.Gao*, “A Platform for the Analysis and Design of Manufacturing Process,” Proceedings 4th International Conf on Control, Automation, Robotics and Vision, Singapore, 1996.

  Books
  • X. Zhao, C.S. Veerappan, and P. Loh, “Real-time, Cross-Platform Detection of New Meltdown and Spectre Attack Variants,” Applied Approach to Privacy and Security for the Internet of Things, accepted 14 Nov 2019.

  • D. Subramanian and P.K.K. Loh, “Malware Analytics for Social Networking,” Trends and Applications of Serious Gaming and Social Media, pp 71-87, Springer, March 2014.

  • P.K.K. Loh, Fault-Tolerant Multiprocessor Networks, 28 June 2009, ISBN: 978-3-639-17238-6, VDM Verlag Dr. Muller Aktiengesellschaft & Co. KG.

  • P.K.K.Loh and A.B.Premkumar, “Self-Reconfiguration in Adaptive Wireless Sensor Networks,” Computer Science Research Trends, Chapter 5, pp 151-180, 2008.

  • P.K.K.Loh and Y. K. Tan, “A Constrained Multipath Routing Protocol for Wireless Sensor Networks,” LNCS - Embedded and Ubiquitous Computing, Vol 4804, pp 661 – 670, Springer-Verlag, Nov 2007.

  • P.K.K.Loh, “A Scalable, Efficient and Reliable Routing Protocol for Wireless Sensor Networks,” LNCS - Ubiquitous Intelligence and Computing, Vol 4159, pp 409-418, Springer-Verlag, Sept 2006.

  • X Zhang and P.K.K.Loh, “A Fault-tolerant Routing Strategy for Fibonacci-class Cubes,” LNCS - Advances in Computer Systems Architecture, Vol 3740, pp 215-228, Springer-Verlag, Oct 2005.

  • P.K.K.Loh, W.J.Hsu, “Design of a Viable Fault-Tolerant Routing Strategy for Optical-Based Grids,” New Horizons of Parallel/Distributed processing with applications, Ed. M.Guo and L.T. Yang, pp 157-172, Springer, 2005.

  • P.K.K.Loh and V.Shaw, “A Genetic-Based Fault-Tolerant Routing Strategy for Multiprocessor Networks,” LNCS – Parallel and Distributed Processing, Vol 1586, pp 220-229, Springer, 1999.

  • P.C.Capon, P.K.K.Loh, “Optimising Processor Farming on a Multiprocessor System,” Parallel and Distributed Processing, Ed. K. Boyanov, 1993, pp. 119-135.

Interests
  • Information and Cyber Security
  • Internet-of-Things
  • Data Analytics
  • Machine Learning
Education
  • PhD (Computer Science)

    Nanyang Technological University , Singapore

  • MSc (Computer Science)

    University of Manchester, England , United Kingdom

  • MSc (Electrical Engineering)

    National University of Singapore , Singapore

  • BEng Hons (Electrical Engineering)

    National University of Singapore , Singapore

Latest