Follow
Hsing-Kuo Pao
Title
Cited by
Cited by
Year
Unifying guilt-by-association approaches: Theorems and fast algorithms
D Koutra, TY Ke, U Kang, DHP Chau, HKK Pao, C Faloutsos
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011
1432011
Game bot identification based on manifold learning
KT Chen, HKK Pao, HC Chang
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support …, 2008
872008
Malicious URL filtering—A big data application
MS Lin, CY Chiu, YJ Lee, HK Pao
2013 IEEE international conference on big data, 589-596, 2013
852013
Game bot detection based on avatar trajectory
KT Chen, A Liao, HKK Pao, HH Chu
International Conference on Entertainment Computing, 94-105, 2008
732008
Measuring convexity for figure/ground separation
HK Pao, D Geiger, N Rubin
Proceedings of the Seventh IEEE International Conference on Computer Vision …, 1999
691999
Efficient dynamic malware analysis using virtual time control mechanics
CH Lin, HK Pao, JW Liao
Computers & Security 73, 359-373, 2018
522018
Game bot detection via avatar trajectory analysis
HK Pao, KT Chen, HC Chang
IEEE Transactions on Computational Intelligence and AI in Games 2 (3), 162-175, 2010
522010
Salient and multiple illusory surfaces
D Geiger, H Pao, N Rubin
Proceedings. 1998 IEEE Computer Society Conference on Computer Vision and …, 1998
441998
Efficient traffic speed forecasting based on massive heterogenous historical data
XY Chen, HK Pao, YJ Lee
2014 IEEE international conference on big data (Big Data), 10-17, 2014
382014
Malicious URL detection based on kolmogorov complexity estimation
HK Pao, YL Chou, YJ Lee
2012 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2012
372012
Efficient and effective NIDS for cloud virtualization environment
CH Lin, CW Tien, HK Pao
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
242012
Trajectory analysis for user verification and recognition
HK Pao, J Fadlil, HY Lin, KT Chen
Knowledge-Based Systems 34, 81-90, 2012
242012
Computing Entropy for Ortholog Detection.
HK Pao, J Case
International Conference on Computational Intelligence, 89-92, 2004
192004
Adaptive alarm filtering by causal correlation consideration in intrusion detection
HS Lin, HK Pao, CH Mao, HM Lee, T Chen, YJ Lee
New Advances in Intelligent Decision Technologies, 437-447, 2009
182009
An introduction to support vector machines
YJ Lee, YR Yeh, HK Pao
National Taiwan University of Science and Technology, Taipei, Taiwan, 2010
162010
Efficient spear-phishing threat detection using hypervisor monitor
CH Lin, CW Tien, CW Chen, CW Tien, HK Pao
2015 International Carnahan Conference on Security Technology (ICCST), 299-303, 2015
152015
An efficient scheduling algorithm for scalable video streaming over P2P networks
KL Hua, GM Chiu, HK Pao, YC Cheng
Computer Networks 57 (14), 2856-2868, 2013
152013
Introduction to support vector machines and their applications in bankruptcy prognosis
YJ Lee, YR Yeh, HK Pao
Handbook of computational finance, 731-761, 2012
152012
Different Manhattan project: automatic statistical model generation
CK Yap, H Biermann, A Hertzmann, C Li, J Meyer, HK Pao, S Paxia
Visualization and Data Analysis 2002 4665, 259-268, 2002
152002
Big active learning
EC Huang, HK Pao, YJ Lee
2017 IEEE International Conference on Big Data (Big Data), 94-101, 2017
142017
The system can't perform the operation now. Try again later.
Articles 1–20