Chansu Han

Orcid: 0000-0002-1728-5300

According to our database1, Chansu Han authored at least 26 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Wafer Type Ion Energy Monitoring Sensor for Plasma Diagnosis.
Sensors, March, 2023

FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities.
IEEE Trans. Emerg. Top. Comput., 2023

Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint.
IEEE Access, 2023

Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach.
IEEE Access, 2023

Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering.
IEEE Access, 2023

Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023

Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems.
IEEE Access, 2022

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns.
IEEE Access, 2022

Malicious Packet Classification Based on Neural Network Using Kitsune Features.
Proceedings of the Intelligent Systems and Pattern Recognition, 2022

Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021

Automated Detection of Malware Activities Using Nonnegative Matrix Factorization.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Investigating behavioral differences between IoT malware via function call sequence graphs.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso.
IEICE Trans. Inf. Syst., 2020

2019
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

2016
Botnet Detection Using Graphical Lasso with Graph Density.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016


  Loading...