Steve T.K. Jan
Steve T.K. Jan
Vahvistettu sähköpostiosoite verkkotunnuksessa - Kotisivu
Crowdsourcing cybersecurity: Cyber attack detection using social media
RP Khandpur, T Ji, S Jan, G Wang, CT Lu, N Ramakrishnan
Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
The next domino to fall: Empirical analysis of user passwords across online services
C Wang, STK Jan, H Hu, D Bossart, G Wang
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Connecting the digital and physical world: Improving the robustness of adversarial attacks
STK Jan, J Messou, YC Lin, JB Huang, G Wang
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 962-969, 2019
Throwing darts in the dark? detecting bots with limited data using neural data augmentation
STK Jan, Q Hao, T Hu, J Pu, S Oswal, G Wang, B Viswanath
2020 IEEE symposium on security and privacy (SP), 1190-1206, 2020
It's not what it looks like: Manipulating perceptual hashing based applications
Q Hao, L Luo, STK Jan, G Wang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Assessing browser-level defense against {IDN-based} phishing
H Hu, STK Jan, Y Wang, G Wang
30th USENIX Security Symposium (USENIX Security 21), 3739-3756, 2021
AI trust in business processes: the need for process-aware explanations
STK Jan, V Ishakian, V Muthusamy
Proceedings of the AAAI Conference on Artificial Intelligence 34 (08), 13403 …, 2020
A simple methodology for soft cost-sensitive classification
TK Jan, DW Wang, CH Lin, HT Lin
Proceedings of the 18th ACM SIGKDD international conference on Knowledge …, 2012
Pay-per-question: towards targeted Q&A with payments
STK Jan, C Wang, Q Zhang, G Wang
Proceedings of the 2018 ACM International Conference on Supporting Group …, 2018
MeiKe: Influence-based Communities in Networks
Y Zhang, B Adhikari, STK Jan, BA Prakash
Proceedings of the 2017 SIAM International Conference on Data Mining, 318-326, 2017
Empirical analysis of password reuse and modification across online service
C Wang, STK Jan, H Hu, G Wang
arXiv preprint arXiv:1706.01939, 2017
Towards monetary incentives in social Q&A services
STK Jan, C Wang, Q Zhang, G Wang
arXiv preprint arXiv:1703.01333, 2017
Cost-sensitive classification on pathogen species of bacterial meningitis by Surface Enhanced Raman Scattering
TK Jan, HT Lin, HP Chen, TC Chern, CY Huang, BC Wen, CW Chung, ...
2011 IEEE International Conference on Bioinformatics and Biomedicine, 390-393, 2011
Analyzing Payment-Driven Targeted Q8A Systems
STK Jan, C Wang, Q Zhang, G Wang
ACM Transactions on Social Computing 1 (3), 1-21, 2018
Analyzing payment based question and answering service
STK Jan, C Wang, Q Zhang, G Wang
CoRR (2017), 2017
Data selection techniques for large-scale rank SVM
KY Lin, TK Jan, HT Lin
2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013
Unstable communities in network ensembles
A Rahman, STK Jan, H Kim, BA Prakash, TM Murali
Proceedings of the 2016 SIAM International Conference on Data Mining, 504-512, 2016
A comparison of methods for cost-sensitive support vector machines
TK Jan
Master's thesis, National Taiwan University, 2010
Causal reasoning for explanation of model predictions
V Isahagian, V Muthusamy, S Jan
US Patent 11,568,281, 2023
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20