Andrew H. Sung

Orcid: 0009-0005-0815-3102

According to our database1, Andrew H. Sung authored at least 123 papers between 1993 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Enhancing Machine Learning Performance with Continuous In-Session Ground Truth Scores: Pilot Study on Objective Skeletal Muscle Pain Intensity Prediction.
CoRR, 2023

How to Detect AI-Generated Texts?
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

Host IP Obfuscation and Performance Analysis.
Proceedings of the Second International Conference on Innovations in Computing Research (ICR'23), 2023

Deepfake Detection: A Tutorial.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

2022
Deepfake Detection: A Systematic Literature Review.
IEEE Access, 2022

2020
Evaluation of Advanced Ensemble Learning Techniques for Android Malware Detection.
Vietnam. J. Comput. Sci., 2020

DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

2019
Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation Problems.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Goal-Oriented Conversational System Using Transfer Learning and Attention Mechanism.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Blockchain Approach to Solve Collective Decision Making Problems for Swarm Robotics.
Proceedings of the Blockchain and Applications - International Congress, 2019

User Level Multi-feed Weighted Topic Embeddings for Studying Network Interaction in Twitter.
Proceedings of the Big Data - BigData 2019, 2019

How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniques.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Evaluating Machine Learning Models for Android Malware Detection: A Comparison Study.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

Evaluation of Tree Based Machine Learning Classifiers for Android Malware Detection.
Proceedings of the Computational Collective Intelligence - 10th International Conference, 2018

2017
Finding the Critical Sampling of Big Datasets.
Proceedings of the Computing Frontiers Conference, 2017

Information Diffusion on Twitter: Pattern Recognition and Prediction of Volume, Sentiment, and Influence.
Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, 2017

2016
Sampling and Evaluating the Big Data for Knowledge Discovery.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Merging Permission and API Features for Android Malware Detection.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Exposing Inpainting Forgery in JPEG Images under Recompression Attacks.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

2015
A Method to Detect AAC Audio Forgery.
EAI Endorsed Trans. Security Safety, 2015

The Critical Feature Dimension and Critical Sampling Problems.
Proceedings of the ICPRAM 2015, 2015

A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Exposing Image Tampering with the Same Quantization Matrix.
Proceedings of the Multimedia Data Mining and Analytics - Disruptive Innovation, 2015

2014
Learning to Detect Phishing Webpages.
J. Internet Serv. Inf. Secur., 2014

Mining the Big Data: The Critical Feature Dimension Problem.
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014

2013
MP3 audio steganalysis.
Inf. Sci., 2013

Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation.
Appl. Intell., 2013

2012
Model evaluation of datasets using critical dimension model invariants.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Dependance of critical dimension on learning machines and ranking methods.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Identification of Smartphone-Image Source and Manipulation.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Feature Selection for Improved Phishing Detection.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Mining Web to Detect Phishing URLs.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

2011
Derivative-based audio steganalysis.
ACM Trans. Multim. Comput. Commun. Appl., 2011

Neighboring joint density-based JPEG steganalysis.
ACM Trans. Intell. Syst. Technol., 2011

A Method to Detect JPEG-Based Double Compression.
Proceedings of the Advances in Neural Networks - ISNN 2011, 2011

Determine the Critical dimension in data mining (experiments with bioinformatics datasets).
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

A JPEG-based statistically invisible steganography.
Proceedings of the ICIMCS 2011, 2011

Locating Information-hiding in MP3 Audio.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 1, 2011

2010
An improved approach to steganalysis of JPEG images.
Inf. Sci., 2010

Detection of Double MP3 Compression.
Cogn. Comput., 2010

Revealing real quality of double compressed MP3 audio.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Predicting embedding strength in audio steganography.
Proceedings of the 9th IEEE International Conference on Cognitive Informatics, 2010

2009
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis.
IEEE Trans. Inf. Forensics Secur., 2009

Distance metric learning and support vector machines for classification of mass spectrometry proteomics data.
Int. J. Knowl. Eng. Soft Data Paradigms, 2009

Improved detection and evaluation for JPEG steganalysis.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

Novel stream mining for audio steganalysis.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

A new approach for JPEG resize and image splicing detection.
Proceedings of the First ACM workshop on Multimedia in forensics, 2009

Spectrum Steganalysis of WAV Audio Streams.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

Steganalysis of MP3Stego.
Proceedings of the International Joint Conference on Neural Networks, 2009

Feature Mining and Intelligent Computing for MP3 Steganalysis.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis.
Proceedings of the ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal, January 19, 2009

Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning.
Proceedings of the BIOSIGNALS 2009, 2009

2008
Detection of Phishing Attacks: A Machine Learning Approach.
Proceedings of the Soft Computing Applications in Industry, 2008

SQL infections through RFID.
J. Comput. Virol., 2008

Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images.
Pattern Recognit., 2008

Image complexity and feature mining for steganalysis of least significant bit matching steganography.
Inf. Sci., 2008

Integrating energy efficiency and security for storage systems.
Proceedings of the IEEE International Conference on Systems, 2008

Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting.
Proceedings of the International Joint Conference on Neural Networks, 2008

Building resilient classifiers for LSB matching steganography.
Proceedings of the International Joint Conference on Neural Networks, 2008

Detecting information-hiding in WAV audios.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Learning Manifolds for Bankruptcy Analysis.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

RFID malware fragmentation attacks.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

2007
Predicting injection profiles using ANFIS.
Inf. Sci., 2007

Hybrid multi-agent framework for detection of stealthy probes.
Appl. Soft Comput., 2007

Obfuscated Malicious Executable Scanner.
J. Res. Pract. Inf. Technol., 2007

Behaviour Mining for Fraud Detection.
J. Res. Pract. Inf. Technol., 2007

Biased Support Vector Machines and Kernel Methods for Intrusion Detection.
Proceedings of the World Congress on Engineering, 2007

Gene Selection for Tumor Classification Using Microarray Gene Expression Data.
Proceedings of the World Congress on Engineering, 2007

Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images.
Proceedings of the IJCAI 2007, 2007

Knowledge Based Discovery of Phishing Attacks.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

Estimating Monthly Production of Oil Wells.
Proceedings of the Theoretical Advances and Applications of Fuzzy Logic and Soft Computing, 2007

Boosting RVM Classifiers for Large Data Sets.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Detecting Coordinated Distributed Multiple Attacks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Real-time scheduling with quality of security constraints.
Int. J. High Perform. Comput. Netw., 2006

Improving database quality through eliminating duplicate records.
Data Sci. J., 2006

Microarray Gene Expression Classification Based on Supervised Learning and Similarity Measures.
Proceedings of the IEEE International Conference on Systems, 2006

Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods.
Proceedings of the International Joint Conference on Neural Networks, 2006

Recursive Feature Addition for Gene Selection.
Proceedings of the International Joint Conference on Neural Networks, 2006

Intrusion Detection Based on Behavior Mining and Machine Learning Techniques.
Proceedings of the Advances in Applied Artificial Intelligence, 2006

Tree Based Behavior Monitoring for Adaptive Fraud Detection.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense).
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Intrusion detection using an ensemble of intelligent paradigms.
J. Netw. Comput. Appl., 2005

Disassembled code analyzer for malware (DCAM).
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005

Dynamic Task Scheduling with Security Awareness in Real-Time Systems.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Fraud Detection System Based on Behavior Mining and Anomaly Detection.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

SAREC: A Security-Aware Scheduling Strategy for Real-Time Applications on Clusters.
Proceedings of the 34th International Conference on Parallel Processing (ICPP 2005), 2005

Integrating Security Requirements into Scheduling for Real-Time Applications in Grid Computing.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005

A New Domain-Independent Field Matching Algorithm for Large Databases.
Proceedings of The 2005 International Conference on Data Mining, 2005

Online Fraud Detection System Based on Non-Stationery Anomaly Detection.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
A framework for countering denial of service attacks.
Proceedings of the IEEE International Conference on Systems, 2004

JPEG Compression Immune Steganography Using Wavelet Transform.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Defeating the Current Steganalysis Techniques (Robust Steganography).
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Detecting Spatial Outliers Using Bipartite Outlier Detection Methods.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach.
Proceedings of the Innovations in Applied Artificial Intelligence, 2004

Computational Intelligent Techniques for Detecting Denial of Service Attacks.
Proceedings of the Innovations in Applied Artificial Intelligence, 2004

Intrusion Detection Systems Using Adaptive Regression Spines.
Proceedings of the Enterprise Information Systems VI, 2004

Intrusion Detection Systems Using Adaptive Regression Splines.
Proceedings of the ICEIS 2004, 2004

Polymorphic Malicious Executable Scanner by API Sequence Analysis.
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004

Website Visitor Classification Using Machine Learning.
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004

Detecting Hidden Information in the Wavelet Domain.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2004

The Feature Selection and Intrusion Detection Problems.
Proceedings of the Advances in Computer Science, 2004

Static Analyzer of Vicious Executables (SAVE).
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques.
Int. J. Digit. EVid., 2003

Artificial intelligent techniques for intrusion detection.
Proceedings of the IEEE International Conference on Systems, 2003

Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

A Distributed Agent Based IDS for Stealthy Probe Detection.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003

A Comparative Study of Techniques for Intrusion Detection.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes.
Proceedings of the Design and Application of Hybrid Intelligent Systems, 2003

Detecting denial of service attacks using support vector machines.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

2002
Role of Soft Computing in Internet Security.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002

Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002

2001
Economical large scale simulation.
Proceedings of the IEEE International Conference on Systems, 2001

Alternate Methods in Reservoir Simulation.
Proceedings of the Computational Science - ICCS 2001, 2001

Monitoring System Security Using Neural Networks and Support Vector Machines.
Proceedings of the Hybrid Information Systems, 2001

2000
A Fuzzy Inference Algorithm for Lithology Analysis in Formation Evaluation.
Proceedings of the Intelligent Problem Solving, 2000

Advances Reservoir Simulation Using Soft Computing.
Proceedings of the Intelligent Problem Solving, 2000

1998
Neural networks as an aid to iterative optimization methods.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

1994
Fingerprint Image Compression by a Clustering Learning Network.
Proceedings of the Seventh International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1994

Fingerprint Image Compression by a Natural Clustering Neural Network.
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994

1993
Preserving visual perception by learning natural clustering.
Proceedings of International Conference on Neural Networks (ICNN'88), San Francisco, CA, USA, March 28, 1993


  Loading...