Unifying guilt-by-association approaches: Theorems and fast algorithms D Koutra, TY Ke, U Kang, DHP Chau, HKK Pao, C Faloutsos Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011 | 116 | 2011 |
Game bot identification based on manifold learning KT Chen, HKK Pao, HC Chang Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support …, 2008 | 81 | 2008 |
Malicious URL filtering—A big data application MS Lin, CY Chiu, YJ Lee, HK Pao 2013 IEEE international conference on big data, 589-596, 2013 | 66 | 2013 |
Game bot detection based on avatar trajectory KT Chen, A Liao, HKK Pao, HH Chu International Conference on Entertainment Computing, 94-105, 2008 | 66 | 2008 |
Measuring convexity for figure/ground separation HK Pao, D Geiger, N Rubin Proceedings of the Seventh IEEE International Conference on Computer Vision …, 1999 | 65 | 1999 |
Game bot detection via avatar trajectory analysis HK Pao, KT Chen, HC Chang IEEE Transactions on Computational Intelligence and AI in Games 2 (3), 162-175, 2010 | 44 | 2010 |
Salient and multiple illusory surfaces D Geiger, H Pao, N Rubin Proceedings. 1998 IEEE Computer Society Conference on Computer Vision and …, 1998 | 44 | 1998 |
Efficient dynamic malware analysis using virtual time control mechanics CH Lin, HK Pao, JW Liao Computers & Security 73, 359-373, 2018 | 32 | 2018 |
Efficient traffic speed forecasting based on massive heterogenous historical data XY Chen, HK Pao, YJ Lee 2014 IEEE international conference on big data (Big Data), 10-17, 2014 | 30 | 2014 |
Malicious URL detection based on kolmogorov complexity estimation HK Pao, YL Chou, YJ Lee 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2012 | 28 | 2012 |
Trajectory analysis for user verification and recognition HK Pao, J Fadlil, HY Lin, KT Chen Knowledge-Based Systems 34, 81-90, 2012 | 23 | 2012 |
Efficient and effective NIDS for cloud virtualization environment CH Lin, CW Tien, HK Pao 4th IEEE International Conference on Cloud Computing Technology and Science …, 2012 | 19 | 2012 |
Computing Entropy for Ortholog Detection. HK Pao, J Case International Conference on Computational Intelligence, 89-92, 2004 | 19 | 2004 |
Adaptive alarm filtering by causal correlation consideration in intrusion detection HS Lin, HK Pao, CH Mao, HM Lee, T Chen, YJ Lee New Advances in Intelligent Decision Technologies, 437-447, 2009 | 17 | 2009 |
An efficient scheduling algorithm for scalable video streaming over P2P networks KL Hua, GM Chiu, HK Pao, YC Cheng Computer Networks 57 (14), 2856-2868, 2013 | 15 | 2013 |
Model trees for classification of hybrid data types HK Pao, SC Chang, YJ Lee International Conference on Intelligent Data Engineering and Automated …, 2005 | 14 | 2005 |
Different Manhattan project: automatic statistical model generation CK Yap, H Biermann, A Hertzmann, C Li, J Meyer, HK Pao, S Paxia Visualization and Data Analysis 2002 4665, 259-268, 2002 | 14 | 2002 |
An intrinsic graphical signature based on alert correlation analysis for intrusion detection HK Pao, CH Mao, HM Lee, CD Chen, C Faloutsos 2010 International Conference on Technologies and Applications of Artificial …, 2010 | 13 | 2010 |
An introduction to support vector machines YJ Lee, YR Yeh, HK Pao National Taiwan University of Science and Technology, 2010 | 13 | 2010 |
Introduction to support vector machines and their applications in bankruptcy prognosis YJ Lee, YR Yeh, HK Pao Handbook of computational finance, 731-761, 2012 | 12 | 2012 |