Muhamad Erza Aminanto
Muhamad Erza Aminanto
Monash University Indonesia
Verified email at
Cited by
Cited by
Deep abstraction and weighted feature selection for Wi-Fi impersonation detection
ME Aminanto, R Choi, HC Tanuwidjaja, PD Yoo, K Kim
IEEE Transactions on Information Forensics and Security 13 (3), 621-636, 2017
Network intrusion detection using deep learning: a feature learning approach
K Kim, ME Aminanto, HC Tanuwidjaja
Springer, 2018
Deep learning in intrusion detection system: An overview
E Aminanto, K Kim
2016 International Research Conference on Engineering and Technology (2016 …, 2016
Detecting impersonation attack in WiFi networks using deep learning approach
ME Aminanto, K Kim
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
Deep learning in intrusion detection perspective: Overview and further challenges
K Kim, ME Aminanto
2017 International Workshop on Big Data and Information Security (IWBIS), 5-10, 2017
Improving detection of Wi-Fi impersonation by fully unsupervised deep learning
ME Aminanto, K Kim
Information Security Applications: 18th International Conference, WISA 2017 …, 2018
Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis
ME Aminanto, T Ban, R Isawa, T Takahashi, D Inoue
IEEE Access 8, 217977-217986, 2020
Another fuzzy anomaly detection system based on ant clustering algorithm
ME Aminanto, HJ Kim, KM Kim, K Kim
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
Detecting active attacks in Wi-Fi network by semi-supervised deep learning
ME Aminanto, K Kim
Conference on information security and cryptography, 2017
Deep learning-based feature selection for intrusion detection system in transport layer
ME Aminanto, K Kim
Proceedings of the Korea Institutes of Information Security and Cryptology …, 2016
Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier
ME Aminanto, HC Tanuwidjaja, PD Yoo, K Kim
2017 International Workshop on Big Data and Information Security (IWBIS), 99-104, 2017
Combating threat-alert fatigue with online anomaly detection using isolation forest
ME Aminanto, L Zhu, T Ban, R Isawa, T Takahashi, D Inoue
Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019
Weighted feature selection techniques for detecting impersonation attack in Wi-Fi networks
ME Aminanto, H Tanuwidjaja, PD Yoo, K Kim
Proc. Symp. Cryptogr. Inf. Secur.(SCIS), 1-8, 2017
Automated threat-alert screening for battling alert fatigue with temporal isolation forest
ME Aminanto, L Zhu, T Ban, R Isawa, T Takahashi, D Inoue
2019 17th International Conference on Privacy, Security and Trust (PST), 1-3, 2019
Multi-class intrusion detection using two-channel color mapping in IEEE 802.11 wireless Network
ME Aminanto, RSH Wicaksono, AE Aminanto, HC Tanuwidjaja, L Yola, ...
IEEE Access 10, 36791-36801, 2022
COVID-19 mortality risk factors using survival analysis: A case study of Jakarta, Indonesia
BI Nasution, Y Nugraha, NL Prasetya, ME Aminanto, A Sulasikin, ...
IEEE Transactions on Computational Social Systems, 2022
Two-dimensional projection-based wireless intrusion classification using lightweight efficientnet
ME Aminanto, IR Purbomukti, H Chandra, K Kim
Computers, Materials & Continua 72 (3), 5301, 2022
Development of protection profile and security target for Indonesia electronic ID card's (KTP-el) card reader based on common criteria V3. 1: 2012/SNI ISO/IEC 15408: 2014
ME Aminanto, S Sutikno
2014 International Conference of Advanced Informatics: Concept, Theory and …, 2014
Lightweight Machine Learning Prediction Algorithm for Network Attack on Software Defined Network
AM Ibrahimy, F Dewanta, ME Aminanto
2022 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), 1-6, 2022
Developing a knowledge management system for supporting flood decision-making
A Sulasikin, Y Nugrahat, ME Aminanto, BI Nasution, JI Kanggrawan
2022 IEEE International Smart Cities Conference (ISC2), 1-4, 2022
The system can't perform the operation now. Try again later.
Articles 1–20