Albert B. Jeng

According to our database1, Albert B. Jeng authored at least 29 papers between 1981 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
WebHound: a data-driven intrusion detection from real-world web access logs.
Soft Comput., 2019

2017
Ziffersystem: A novel malware distribution detection system.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2015
JSOD: JavaScript obfuscation detector.
Secur. Commun. Networks, 2015

DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2013
DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2013

A Study on Online Game Cheating and the Effective Defense.
Proceedings of the Recent Trends in Applied Artificial Intelligence, 2013

Larbac: enforcement of location constraints for location-aware RBAC system in mobile environment.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

2012
Android Malware Detection via a Latent Network Behavior Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3<sup>rd</sup> Party Human Attack.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Android privacy.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

A novel approach for re-authentication protocol using personalized information.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

2011
RePEF - A system for Restoring Packed Executable File for malware analysis.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

AOS: An optimized sandbox method used in behavior-based malware detection.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

How to solve collision and authentication issues using RFID protocol technology.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

2010
The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Exploring better parameter set for singular value decomposition (SVD) hashing function used in image authentication.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

A Study of CAPTCHA and Its Application to User Authentication.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2008
A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol.
IEICE Trans. Inf. Syst., 2008

2005
One private-key for all DL-based cryptosystems.
Appl. Math. Comput., 2005

Meta-He digital signatures based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

1997
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults.
Proceedings of the Security Protocols, 1997

A New On-Line Cash Check Scheme.
Proceedings of the CCS '97, 1997

Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1987
Network security: Protocol reference model and the trusted computer system evaluation criteria.
IEEE Netw., 1987

1983
An All-In-One C3I Local Area Network.
Proceedings of the Proceedings IEEE INFOCOM 83, San Diego, CA, USA, April 18-21, 1983, 1983

1981
Control Memory Wort Width Optimization Using Multiple-Valued Circuits.
IEEE Trans. Computers, 1981


  Loading...