Follow
Hsing-Kuo Pao
Title
Cited by
Cited by
Year
Unifying guilt-by-association approaches: Theorems and fast algorithms
D Koutra, TY Ke, U Kang, DH Chau, HKK Pao, C Faloutsos
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2011
1602011
Malicious URL filtering—A big data application
MS Lin, CY Chiu, YJ Lee, HK Pao
2013 IEEE international conference on big data, 589-596, 2013
962013
Game bot identification based on manifold learning
KT Chen, HKK Pao, HC Chang
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support …, 2008
942008
Game bot detection based on avatar trajectory
KT Chen, A Liao, HKK Pao, HH Chu
International Conference on Entertainment Computing, 94-105, 2008
812008
Measuring convexity for figure/ground separation
HK Pao, D Geiger, N Rubin
Proceedings of the Seventh IEEE International Conference on Computer Vision …, 1999
721999
Efficient dynamic malware analysis using virtual time control mechanics
CH Lin, HK Pao, JW Liao
Computers & Security 73, 359-373, 2018
632018
Game bot detection via avatar trajectory analysis
HK Pao, KT Chen, HC Chang
IEEE Transactions on Computational Intelligence and AI in Games 2 (3), 162-175, 2010
572010
Salient and multiple illusory surfaces
D Geiger, H Pao, N Rubin
Proceedings. 1998 IEEE Computer Society Conference on Computer Vision and …, 1998
491998
Efficient traffic speed forecasting based on massive heterogenous historical data
XY Chen, HK Pao, YJ Lee
2014 IEEE international conference on big data (Big Data), 10-17, 2014
442014
Malicious URL detection based on kolmogorov complexity estimation
HK Pao, YL Chou, YJ Lee
2012 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2012
402012
Trajectory analysis for user verification and recognition
HK Pao, J Fadlil, HY Lin, KT Chen
Knowledge-Based Systems 34, 81-90, 2012
282012
Efficient and effective NIDS for cloud virtualization environment
CH Lin, CW Tien, HK Pao
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
272012
Adaptive alarm filtering by causal correlation consideration in intrusion detection
HS Lin, HK Pao, CH Mao, HM Lee, T Chen, YJ Lee
New Advances in Intelligent Decision Technologies: Results of the First KES …, 2009
182009
Computing Entropy for Ortholog Detection.
HK Pao, J Case
International Conference on Computational Intelligence, 89-92, 2004
182004
Introduction to support vector machines and their applications in bankruptcy prognosis
YJ Lee, YR Yeh, HK Pao
Handbook of computational finance, 731-761, 2011
172011
Different Manhattan project: automatic statistical model generation
CK Yap, H Biermann, A Hertzmann, C Li, J Meyer, HK Pao, S Paxia
Visualization and Data Analysis 2002 4665, 259-268, 2002
162002
Efficient spear-phishing threat detection using hypervisor monitor
CH Lin, CW Tien, CW Chen, CW Tien, HK Pao
2015 International Carnahan Conference on Security Technology (ICCST), 299-303, 2015
152015
An introduction to support vector machines
YJ Lee, YR Yeh, HK Pao
National Taiwan University of Science and Technology, 2010
152010
An efficient scheduling algorithm for scalable video streaming over P2P networks
KL Hua, GM Chiu, HK Pao, YC Cheng
Computer Networks 57 (14), 2856-2868, 2013
142013
An RSVM based two-teachers–one-student semi-supervised learning algorithm
CC Chang, HK Pao, YJ Lee
Neural Networks 25, 57-69, 2012
142012
The system can't perform the operation now. Try again later.
Articles 1–20