Hsing-Kuo Pao
Title
Cited by
Cited by
Year
Unifying guilt-by-association approaches: Theorems and fast algorithms
D Koutra, TY Ke, U Kang, DHP Chau, HKK Pao, C Faloutsos
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011
1202011
Game bot identification based on manifold learning
KT Chen, HKK Pao, HC Chang
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support …, 2008
812008
Malicious URL filtering—A big data application
MS Lin, CY Chiu, YJ Lee, HK Pao
2013 IEEE international conference on big data, 589-596, 2013
672013
Game bot detection based on avatar trajectory
KT Chen, A Liao, HKK Pao, HH Chu
International Conference on Entertainment Computing, 94-105, 2008
672008
Measuring convexity for figure/ground separation
HK Pao, D Geiger, N Rubin
Proceedings of the Seventh IEEE International Conference on Computer Vision …, 1999
661999
Game bot detection via avatar trajectory analysis
HK Pao, KT Chen, HC Chang
IEEE Transactions on Computational Intelligence and AI in Games 2 (3), 162-175, 2010
452010
Salient and multiple illusory surfaces
D Geiger, H Pao, N Rubin
Proceedings. 1998 IEEE Computer Society Conference on Computer Vision and …, 1998
441998
Efficient dynamic malware analysis using virtual time control mechanics
CH Lin, HK Pao, JW Liao
Computers & Security 73, 359-373, 2018
332018
Efficient traffic speed forecasting based on massive heterogenous historical data
XY Chen, HK Pao, YJ Lee
2014 IEEE international conference on big data (Big Data), 10-17, 2014
312014
Malicious URL detection based on kolmogorov complexity estimation
HK Pao, YL Chou, YJ Lee
2012 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2012
282012
Trajectory analysis for user verification and recognition
HK Pao, J Fadlil, HY Lin, KT Chen
Knowledge-Based Systems 34, 81-90, 2012
232012
Efficient and effective NIDS for cloud virtualization environment
CH Lin, CW Tien, HK Pao
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
202012
Computing Entropy for Ortholog Detection.
HK Pao, J Case
International Conference on Computational Intelligence, 89-92, 2004
192004
Adaptive alarm filtering by causal correlation consideration in intrusion detection
HS Lin, HK Pao, CH Mao, HM Lee, T Chen, YJ Lee
New Advances in Intelligent Decision Technologies, 437-447, 2009
172009
An efficient scheduling algorithm for scalable video streaming over P2P networks
KL Hua, GM Chiu, HK Pao, YC Cheng
Computer Networks 57 (14), 2856-2868, 2013
152013
Model trees for classification of hybrid data types
HK Pao, SC Chang, YJ Lee
International Conference on Intelligent Data Engineering and Automated …, 2005
142005
Different Manhattan project: automatic statistical model generation
CK Yap, H Biermann, A Hertzmann, C Li, J Meyer, HK Pao, S Paxia
Visualization and Data Analysis 2002 4665, 259-268, 2002
142002
An intrinsic graphical signature based on alert correlation analysis for intrusion detection
HK Pao, CH Mao, HM Lee, CD Chen, C Faloutsos
2010 International Conference on Technologies and Applications of Artificial …, 2010
132010
An introduction to support vector machines
YJ Lee, YR Yeh, HK Pao
National Taiwan University of Science and Technology, 2010
132010
Introduction to support vector machines and their applications in bankruptcy prognosis
YJ Lee, YR Yeh, HK Pao
Handbook of computational finance, 731-761, 2012
122012
The system can't perform the operation now. Try again later.
Articles 1–20