Unifying guilt-by-association approaches: Theorems and fast algorithms D Koutra, TY Ke, U Kang, DH Chau, HKK Pao, C Faloutsos Machine Learning and Knowledge Discovery in Databases: European Conference …, 2011 | 165 | 2011 |
Malicious URL filtering—A big data application MS Lin, CY Chiu, YJ Lee, HK Pao 2013 IEEE international conference on big data, 589-596, 2013 | 95 | 2013 |
Game bot identification based on manifold learning KT Chen, HKK Pao, HC Chang Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support …, 2008 | 93 | 2008 |
Game bot detection based on avatar trajectory KT Chen, A Liao, HKK Pao, HH Chu International Conference on Entertainment Computing, 94-105, 2008 | 84 | 2008 |
Measuring convexity for figure/ground separation HK Pao, D Geiger, N Rubin Proceedings of the Seventh IEEE International Conference on Computer Vision …, 1999 | 72 | 1999 |
Efficient dynamic malware analysis using virtual time control mechanics CH Lin, HK Pao, JW Liao Computers & Security 73, 359-373, 2018 | 67 | 2018 |
Game bot detection via avatar trajectory analysis HK Pao, KT Chen, HC Chang IEEE Transactions on Computational Intelligence and AI in Games 2 (3), 162-175, 2010 | 59 | 2010 |
Salient and multiple illusory surfaces D Geiger, H Pao, N Rubin Proceedings. 1998 IEEE Computer Society Conference on Computer Vision and …, 1998 | 48 | 1998 |
Efficient traffic speed forecasting based on massive heterogenous historical data XY Chen, HK Pao, YJ Lee 2014 IEEE international conference on big data (Big Data), 10-17, 2014 | 45 | 2014 |
Malicious URL detection based on kolmogorov complexity estimation HK Pao, YL Chou, YJ Lee 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2012 | 43 | 2012 |
Trajectory analysis for user verification and recognition HK Pao, J Fadlil, HY Lin, KT Chen Knowledge-Based Systems 34, 81-90, 2012 | 31 | 2012 |
Conditional diffusion models for semantic 3d medical image synthesis Z Dorjsembe, HK Pao, S Odonchimed, F Xiao Authorea Preprints, 2023 | 27 | 2023 |
Efficient and effective NIDS for cloud virtualization environment CH Lin, CW Tien, HK Pao 4th IEEE International Conference on Cloud Computing Technology and Science …, 2012 | 27 | 2012 |
Introduction to support vector machines and their applications in bankruptcy prognosis YJ Lee, YR Yeh, HK Pao Handbook of computational finance, 731-761, 2011 | 19 | 2011 |
Computing Entropy for Ortholog Detection. HK Pao, J Case International Conference on Computational Intelligence, 89-92, 2004 | 19 | 2004 |
A passive-aggressive algorithm for semi-supervised learning CC Chang, YJ Lee, HK Pao 2010 International Conference on Technologies and Applications of Artificial …, 2010 | 18 | 2010 |
Adaptive alarm filtering by causal correlation consideration in intrusion detection HS Lin, HK Pao, CH Mao, HM Lee, T Chen, YJ Lee New Advances in Intelligent Decision Technologies: Results of the First KES …, 2009 | 18 | 2009 |
Efficient spear-phishing threat detection using hypervisor monitor CH Lin, CW Tien, CW Chen, CW Tien, HK Pao 2015 International Carnahan Conference on Security Technology (ICCST), 299-303, 2015 | 17 | 2015 |
Different Manhattan project: automatic statistical model generation CK Yap, H Biermann, A Hertzmann, C Li, J Meyer, HK Pao, S Paxia Visualization and Data Analysis 2002 4665, 259-268, 2002 | 16 | 2002 |
Connected vehicle safety science, system, and framework KW Chen, HM Tsai, CH Hsieh, SD Lin, CC Wang, SW Yang, SY Chien, ... 2014 IEEE World Forum on Internet of Things (WF-IoT), 235-240, 2014 | 14 | 2014 |