Hsing-Kuo Pao
Citata da
Citata da
Unifying guilt-by-association approaches: Theorems and fast algorithms
D Koutra, TY Ke, U Kang, DHP Chau, HKK Pao, C Faloutsos
Joint European Conference on Machine Learning and Knowledge Discovery iná…, 2011
Game bot identification based on manifold learning
KT Chen, HKK Pao, HC Chang
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Supportá…, 2008
Game bot detection based on avatar trajectory
KT Chen, A Liao, HKK Pao, HH Chu
International Conference on Entertainment Computing, 94-105, 2008
Measuring convexity for figure/ground separation
HK Pao, D Geiger, N Rubin
Proceedings of the Seventh IEEE International Conference on Computer Visioná…, 1999
Malicious URL filtering—A big data application
MS Lin, CY Chiu, YJ Lee, HK Pao
2013 IEEE international conference on big data, 589-596, 2013
Salient and multiple illusory surfaces
D Geiger, H Pao, N Rubin
Proceedings. 1998 IEEE Computer Society Conference on Computer Vision andá…, 1998
Game bot detection via avatar trajectory analysis
HK Pao, KT Chen, HC Chang
IEEE Transactions on Computational Intelligence and AI in Games 2 (3), 162-175, 2010
Efficient dynamic malware analysis using virtual time control mechanics
CH Lin, HK Pao, JW Liao
Computers & Security 73, 359-373, 2018
Efficient traffic speed forecasting based on massive heterogenous historical data
XY Chen, HK Pao, YJ Lee
2014 IEEE international conference on big data (Big Data), 10-17, 2014
Malicious URL detection based on kolmogorov complexity estimation
HK Pao, YL Chou, YJ Lee
2012 IEEE/WIC/ACM International Conferences on Web Intelligence andá…, 2012
Trajectory analysis for user verification and recognition
HK Pao, J Fadlil, HY Lin, KT Chen
Knowledge-Based Systems 34, 81-90, 2012
Efficient and effective NIDS for cloud virtualization environment
CH Lin, CW Tien, HK Pao
4th IEEE International Conference on Cloud Computing Technology and Scienceá…, 2012
Computing Entropy for Ortholog Detection.
HK Pao, J Case
International Conference on Computational Intelligence, 89-92, 2004
Adaptive alarm filtering by causal correlation consideration in intrusion detection
HS Lin, HK Pao, CH Mao, HM Lee, T Chen, YJ Lee
New Advances in Intelligent Decision Technologies, 437-447, 2009
An efficient scheduling algorithm for scalable video streaming over P2P networks
KL Hua, GM Chiu, HK Pao, YC Cheng
Computer Networks 57 (14), 2856-2868, 2013
Different Manhattan project: automatic statistical model generation
CK Yap, H Biermann, A Hertzmann, C Li, J Meyer, HK Pao, S Paxia
Visualization and Data Analysis 2002 4665, 259-268, 2002
Model trees for classification of hybrid data types
HK Pao, SC Chang, YJ Lee
International Conference on Intelligent Data Engineering and Automatedá…, 2005
Introduction to support vector machines and their applications in bankruptcy prognosis
YJ Lee, YR Yeh, HK Pao
Handbook of computational finance, 731-761, 2012
An RSVM based two-teachers–one-student semi-supervised learning algorithm
CC Chang, HK Pao, YJ Lee
Neural Networks 25, 57-69, 2012
An intrinsic graphical signature based on alert correlation analysis for intrusion detection
HK Pao, CH Mao, HM Lee, CD Chen, C Faloutsos
2010 International Conference on Technologies and Applications of Artificialá…, 2010
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20