banner
Search:
Welcome Guest ( Login )



Name: Dr. Ooi Shih Yin
Position:Lecturer
Office:ITAR 2010
Telephone:606-2523053
Fax:606-2318840
Recreational Interests:
Quote:"I hear and I forget. I see and I remember. I do and I understand", by Confucius
Email and Homepage:

Name: Dr. Ooi Shih Yin
Qualifications:Academic Qualifications:

Bachelor of Information Technology
Master of Science (IT)

Professional Certifications:

EC Council CEH (Certified Ethical Hacker)
EC Council ECSA (EC Council Certified Security Analyst)
EC Council CEI (Certified Instructor)
EC Council CHFI (Computer Hacking Forensic Investigator)
IBM Certified Academic Associate (DB2 9 Database and Application Fundamentals)
Certified Trainer for Pembangunan Sumber Manusia Berhad (PSMB)
Awards/Major Appointments:Awards:

HSBC Young IT Entre-preneur Awards 2003
MMU Book Award 2004
MMU Excellent Teaching Awards 2014

Major Appointments:

Program Coordinator for B.IT (HONS) Security Technology
Ordinary member of Information Security Professional Association of Malaysia (ISPA)
Certified member of EC-Council

Mentor/ Coach for Competitions:
Champion in 2015 UTP-Hax National Hacking Competition, year 2015
Champion in 2015 F-Secure National Inter-Varsity IT Security Competition, year 2015
Champion in 2014 UTP-Hax National Hacking Competition, year 2014
Champion in 2014 HITB-HackWEEKDAY, year 2014
Best Surface / Windows Store App in 2014 HITB-HackWEEKDAY, year 2014
1st runner-up in 2014 Teradata Big Data Discovery Hackathon, year 2014
2nd runner-up in 2014 F-Secure National Inter-Varsity IT Security Competition, year 2014
Champion in 2013 F-Secure National Inter-Varsity IT Security Competition, year 2013
1st runner-up in iHack Forensic Challenge, year 2013
2nd runner-up in iHack Forensic Challenge, year 2013
Champion in MISTI Johor, year 2012
1st runner-up in MISTI Johor, year 2012
1st runner-up in Hack@10, year 2012
Champion in iHack, year 2010
2nd runner-up iHack, year 2010
Research Interests:Security Authentication, Biometrics Application, Temporal Data Mining, Temporal Data Classification
Research Projects:Completed:

1. Offline Signature Verification Through Reissuable Biometrics
2. Secure Mobile-Internet and Group Authentication using Dynamic Handwritten Signature With Public Key Infrastructure
3. Design of The Cancelable Touchless Fingerprint Verification System
4. Human Computer Interaction Interface: Emotion Identification From Facial Expression
5. Smart Home Care System With Wearable Sensor and Omni-Directional Vision
6. Camera-Based Signature Verification System
7. UbeAware: Ubiquitous Awareness in Adversely Subtle Situations
8. A Predictive Rule Model for Anomaly-Based Intrusion Detection System


Ongoing:

1. Temporal Classification Using Artificial Neural Networks
2. A Method for the Construction of Bayesian Belief Network Based Causal Reasoning Model through Fuzzy Cognitive Map
3. Enhanced Algorithmic Quality of Service Framework for Real-time Applications in Long Term Evolution Wireless Technologies
4. Nonlinear Feature Analysis for Face Recognition
5. Utilising 2.5D Partial Face Data in Face Recognition System
6. Secured Face Verification via Locality Preserving Embedding
Publications:Journal:
Ooi, S.Y.,Teoh, A.B.J, Pang, Y.H., Hiew, B.Y. (2016). Image-Based Handwritten Signature Verification Using Hybrid Methods of Discrete Radon Transform, Principal Component Analysis and Probabilistic Neural Network, Applied Soft Computing. ISSN 1568-4946, Vol. 40, pp. 274-282.

Ang, E.M., Wee, K.K., Pang, Y.H., Ooi, S.Y. (2014). A Performance Analysis on Enhanced Two-Level Scheduling Framework for Real-Time Traffic in LTE. Academic Journal of Science 3(3).

Ooi, S.Y., Tan, S.C., Cheah, W.P. (2014). Temporal Decision Tree and Interpretable Temporal Rules: J48 and Fuzzy Cognitive Maps Approach. Australian Journal Intelligent Information Processing Systems, 14(1).

Ooi, S.Y., Tan, S.C., Cheah, W.P. (2014). Anomaly Based Intrusion Detection through Temporal Classification. Neural Information Processing, Lecture Notes in Computer Science (LNCS), Vol. 8836, pp. 612-619, 21st International Conference on Neural Information Processing (ICONIP 2014).

Goh, F.L., Pang, Y.H., Liew, Y.P., Ooi, S.Y., Loo, C.K. (2014). Wavelet Based SDA for Face Recognition. Neural Information Processing, Lecture Notes in Computer Science (LNCS), Vol. 8836, pp. 628-635, 21st International Conference on Neural Information Processing (ICONIP 2014).

Pang Y.H., Ooi S.Y., Teo C.C., Low C.Y., Hiew F.S., Goh K.O. (2013). Regularized Independent Component Analysis Regularization in Face Verification, International Journal of Computer Science and Network Security. ISSN 1738-7906, Vol. 13, No. 10, pp. 54-60.

Ooi, S.Y.,Teoh, A.B.J, Pang, Y.H., Hiew, B.Y., Hiew, F.S. (2013). Reissuable Biometrics through Image-Based Handwritten Signature Verification, International Journal of Computer Science and Network Security. ISSN 1738-7906, Vol. 13, No. 6, pp. 18-26.

Ooi, S.Y., Leong, Y.M., Lim, M.F., Tiew, H.K., Pang, Y.H. (2013). Network Intrusion Data Analysis via Consistency Subset Evaluator with ID3, C4.5 and Best-First Trees, International Journal of Computer Science and Network Security. ISSN 1738-7906, Vol. 13, No. 2, pp. 7-13.

Ooi, S.Y., Tee, W., and Hiew, B.Y. (2012). Camera-Based Signature Verification System through Discrete Radon Transform (DRT) and Principle Component Analysis (PCA), Journal of Information Assurance and Security. ISSN 1554-1010, Vol. 7, pp. 70-77.

Hiew, B.Y., Teoh, A.B.J., Ooi S.Y., and Fakhriah, F. (2010). A Secure Touch-less based Fingerprint Verification System. Journal of WSCG, vol. 18, Issue 1-3, pp. 1-8.

Hiew, B.Y., Teoh, A.B.J., and Ooi, S.Y. (2010). A Secure Digital Camera Based Fingerprint Verification System, Journal of Visual Communication and Image Representation, vol.21, Issue 3, pp. 219-231.

Pang. Y.H., Teoh, A.B.J., Abas, F.S.,and Ooi, S.Y.(2010). Class-label Locally Linear Embedding in face Recognition. Bahria University Journal of Information & Communication Technology, vol.2, no.1, pp.18-26.


Conference paper:
Kevin, Y.S.K, Ooi, S.Y., Pang, Y.H., Wee, K.K. (2015). Real Time Mobile Application of In-Air Signature with Fast Dynamic Time Warping (FastDTW). In the proceedings of IEEE International Conference on Signal and Image Processing Applications (ICSIPA), pp. 315-360.

Ling, C.X., Ooi, S.Y., Pang, Y.H. (2015). Intelligent Web Crawler for File Safety Inspection. In the proceedings of IEEE International Conference on Signal and Image Processing Applications (ICSIPA), pp. 309-314.

Goh, F.L., Pang, Y.H., Khor, E.Y., Ooi, S.Y. (2015). Face Recognition via Semi-Supervised Discriminant Local Analysis. In the proceedings of IEEE International Conference on Signal and Image Processing Applications (ICSIPA), pp. 292-297.

Wee, K.K., Liew, T.H., Ooi, S.Y., Chong, S.C. (2014). QoS Provisioning Through Bandwidth Granting Scheme for Wireless Networks. In the proceedings of The Seventh International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ), pp. 1-6.

Saed, N., Liew, T.H., Wee, K.K., Ooi, S.Y. (2013). Video and Voice Transmission over LTE Networks. In the proceedings of 2013 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp. 259-263.

Pang, Y.H., Teo, C.C., Ooi, S.Y., Lau, S.H., Hiew, F.S., Liew, Y.P. (2013). Regularized Independent Component Analysis in Face Verification. In the proceedings of The Second International Conference on Informatics Engineering & Information Science (ICIEIS), pp. 60-67.

Ooi, S.Y., Tan, S.C., Cheah, W.P.(2012). Temporal Data Classification using k-Means and Decision Trees. In the proceedings of IADIS International Conference Applied Computing (IADIS AC 2012), pp. 131-138.

Goh, Y.L., Ooi, S.Y., and Pang, Y.H. (2012). State of the Art: A Study on Fall Detection. In the proceedings of International Conference on Machine Vision, Image Processing, and Pattern Analysis (ICMVIPPA 2012), pp. 294-298.

Tee, W., and Ooi, S.Y. (2011). State of The Art: Signature Verification System. In the proceedings of 7th International Conference on Information Assurance and Security (IAS2011), pp. 110-115.

Pang, Y.H., Fazly, S.A., Khoh, W.H., and Ooi, S.Y. (2011). Regularized Neighbourhood Preserving Embedding in Face Recognition. In the proceedings of 3rd International Conference on Computer Engineering and Technology (ICCET 2011).

Ooi, S.Y., Teoh, B.J.A, Hiew,B.Y., and Pang Y.H.(2010). Offline Signature Verification through Probabilistic Neural Network. In the procedings of 18th WSCG International Conference on Computer Graphics, Visualization and Computer Vision, pp. SH-3.

Ooi, S.Y., Teoh, B.J.A, and Ong,T.S. (2008). Compatibility of Biometric Strengthening with Probabilistic Neural Network. In the proceedings of International Symposium on Biometrics and Security Technologies (ISBAST), Elec. Copy in IEEExplore.

Ooi, S.Y., Teoh, B.J.A, and Ong,T.S. (2007). Security Analysis for Biometric Strengthening by Using Offline Signature Verification. In the proceedings of the MMU International Symposium on Information and Communications Technologies, pp. TS3A-2.

Ooi, S.Y., Teoh, B.J.A, and Ong, T.S. (2007). Offline Signature Verification through Biometric Strengthening. In the proceedings of the Fifth IEEE Workshop on Automatic Identification Advanced Technologies, pp. 226-231.

Ooi, S.Y., Teoh, B.J.A, and Ngo, C.L.D. (2006). Offline Signature Verification by Binary Image Processing. In the proceedings of the MMU International Symposium on Information and Communications Technologies, pp. 303-308.

Ooi, S.Y., Teoh, B.J.A., and Ngo, C.L.D. (2006). Offline Signature Verification through Discrete Radon Transform and Principle Component Analysis. Proceedings of International Conference on Computer and Communication Engineering, vol. 1, pp.164-167.