Hsing-Kuo Pao
Cited by
Cited by
Unifying guilt-by-association approaches: Theorems and fast algorithms
D Koutra, TY Ke, U Kang, DH Chau, HKK Pao, C Faloutsos
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2011
Malicious URL filtering—A big data application
MS Lin, CY Chiu, YJ Lee, HK Pao
2013 IEEE international conference on big data, 589-596, 2013
Game bot identification based on manifold learning
KT Chen, HKK Pao, HC Chang
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support …, 2008
Game bot detection based on avatar trajectory
KT Chen, A Liao, HKK Pao, HH Chu
International Conference on Entertainment Computing, 94-105, 2008
Measuring convexity for figure/ground separation
HK Pao, D Geiger, N Rubin
Proceedings of the Seventh IEEE International Conference on Computer Vision …, 1999
Efficient dynamic malware analysis using virtual time control mechanics
CH Lin, HK Pao, JW Liao
Computers & Security 73, 359-373, 2018
Game bot detection via avatar trajectory analysis
HK Pao, KT Chen, HC Chang
IEEE Transactions on Computational Intelligence and AI in Games 2 (3), 162-175, 2010
Salient and multiple illusory surfaces
D Geiger, H Pao, N Rubin
Proceedings. 1998 IEEE Computer Society Conference on Computer Vision and …, 1998
Efficient traffic speed forecasting based on massive heterogenous historical data
XY Chen, HK Pao, YJ Lee
2014 IEEE international conference on big data (Big Data), 10-17, 2014
Malicious URL detection based on kolmogorov complexity estimation
HK Pao, YL Chou, YJ Lee
2012 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2012
Trajectory analysis for user verification and recognition
HK Pao, J Fadlil, HY Lin, KT Chen
Knowledge-Based Systems 34, 81-90, 2012
Efficient and effective NIDS for cloud virtualization environment
CH Lin, CW Tien, HK Pao
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
Introduction to support vector machines and their applications in bankruptcy prognosis
YJ Lee, YR Yeh, HK Pao
Handbook of computational finance, 731-761, 2011
Computing Entropy for Ortholog Detection.
HK Pao, J Case
International Conference on Computational Intelligence, 89-92, 2004
Conditional diffusion models for semantic 3d medical image synthesis
Z Dorjsembe, HK Pao, S Odonchimed, F Xiao
Authorea Preprints, 2023
Adaptive alarm filtering by causal correlation consideration in intrusion detection
HS Lin, HK Pao, CH Mao, HM Lee, T Chen, YJ Lee
New Advances in Intelligent Decision Technologies: Results of the First KES …, 2009
Efficient spear-phishing threat detection using hypervisor monitor
CH Lin, CW Tien, CW Chen, CW Tien, HK Pao
2015 International Carnahan Conference on Security Technology (ICCST), 299-303, 2015
A passive-aggressive algorithm for semi-supervised learning
CC Chang, YJ Lee, HK Pao
2010 International Conference on Technologies and Applications of Artificial …, 2010
Different Manhattan project: automatic statistical model generation
CK Yap, H Biermann, A Hertzmann, C Li, J Meyer, HK Pao, S Paxia
Visualization and Data Analysis 2002 4665, 259-268, 2002
An efficient scheduling algorithm for scalable video streaming over P2P networks
KL Hua, GM Chiu, HK Pao, YC Cheng
Computer Networks 57 (14), 2856-2868, 2013
The system can't perform the operation now. Try again later.
Articles 1–20