Academic Profile : Faculty
Assoc Prof Lam Siew Kei
Associate Professor, College of Computing & Data Science
Assistant Chair (Admissions and Outreach), School of Computer Science and Engineering (SCSE)
Email
External Links
Siew Kei received his BASc, MEng and PhD from School of Computer Engineering, NTU. He was a Visiting Research Fellow in the Imperial College of London, University of Warwick, and RWTH Aachen, Germany. He is currently an Associate Professor in College of Computing & Data Science, NTU. His research investigates custom computing techniques to meet the challenging demands for performance, energy-efficiency, cost, reliability, and security in edge intelligence.
Custom Computing; High Level Synthesis; Heterogeneous and Reconfigurable Computing Systems; Embedded Vision and Autonomous Systems
- FL-SLAM: Federated Lifelong SLAM
- Protecting Critical AI Assets for Edge Intelligence
- ROAD USER TRAJECTORY PREDICTION USING ENHANCED SCENE CONTEXT
US 2020/0151305 A1: Computer Program Code Obfuscation Methods And Systems (2022)
Abstract: Methods and systems for obfuscating computer program code are disclosed. In an embodiment, a method of generating obfuscated binary code from input source code for execution on a target processor comprises: generating a set of random obfuscation transform selections; and iteratively optimizing the obfuscation transform selections until a termination criterion is met. The obfuscation transformation selections may comprise indications of custom instructions which are executable on the co-processor in order to reduce side channel leakage.
US 2021/0084061 A1: Bio-Inspired Agile Cyber-Security Assurance Framework (2024)
Abstract: A framework for efficiently and automatically exploring a data network and accurately identifying network threats, which comprises a plurality of software and hardware-based agents, distributed over the data network. The agents are capable of adjusting or reconfiguring, on the fly, the behavior of the agents and their ability to collect data in a targeted manner, so as to investigate suspicious incidents and alerts and collect data that was not yet collected by the system; collecting forensic data by executing tasks defined in workflows, being distributed threat intercepting programs and reporting about the collected forensic data, back to a Central Control Unit (C&C). Distributed threat intercepting programs (“workflows”) are used to provide instructions to agents, to perform branching and provide instructions to the Central Control Unit (C&C), which orchestrates the agents to assure proper execution of the workflows; analyzes the collected information and presents ongoing status to an operator supervising the data network.
Abstract: Methods and systems for obfuscating computer program code are disclosed. In an embodiment, a method of generating obfuscated binary code from input source code for execution on a target processor comprises: generating a set of random obfuscation transform selections; and iteratively optimizing the obfuscation transform selections until a termination criterion is met. The obfuscation transformation selections may comprise indications of custom instructions which are executable on the co-processor in order to reduce side channel leakage.
US 2021/0084061 A1: Bio-Inspired Agile Cyber-Security Assurance Framework (2024)
Abstract: A framework for efficiently and automatically exploring a data network and accurately identifying network threats, which comprises a plurality of software and hardware-based agents, distributed over the data network. The agents are capable of adjusting or reconfiguring, on the fly, the behavior of the agents and their ability to collect data in a targeted manner, so as to investigate suspicious incidents and alerts and collect data that was not yet collected by the system; collecting forensic data by executing tasks defined in workflows, being distributed threat intercepting programs and reporting about the collected forensic data, back to a Central Control Unit (C&C). Distributed threat intercepting programs (“workflows”) are used to provide instructions to agents, to perform branching and provide instructions to the Central Control Unit (C&C), which orchestrates the agents to assure proper execution of the workflows; analyzes the collected information and presents ongoing status to an operator supervising the data network.