Gu Hsin Lai

Orcid: 0000-0001-8310-5120

According to our database1, Gu Hsin Lai authored at least 22 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Detecting PE infection-based malware.
Int. J. Secur. Networks, 2021

2020
A Power-Efficient Approach to Detect Mobile Threats on the Emergent Network Environment.
IEEE Access, 2020

The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Applying Convolutional Neural Network for Malware Detection.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

A Study on Security Trend based on News Analysis.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

2018
Evolution of Advanced Persistent Threat (APT) Attacks and Actors.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual?
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Improving Alert Accuracy for Smart Vehicles.
Proceedings of the Network and System Security - 11th International Conference, 2017

Identifying Threat Patterns of Android Applications.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A Structure Similarity-based Approach to Malicious Android App Detection.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks.
Proceedings of the Genetic and Evolutionary Computing, 2015

2014
Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code.
Proceedings of the 2014 International Conference on Trustworthy Systems and their Applications, 2014

An efficient honeypot based malware classification system.
Proceedings of the Intelligent Systems and Applications, 2014

A Light-Weight Penetration Test Tool for IPv6 Threats.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2011
A Group-Based Deployment for Wormhole Prevention in Sensor Networks.
J. Inf. Sci. Eng., 2011

2009
Anti-spam Filter Based on Data Mining and Statistical Test.
Proceedings of the Computer and Information Science 2009 [outstanding papers from the 8th ACIS/IEEE International Conference on Computer and Information Science, 2009

A collaborative anti-spam system.
Expert Syst. Appl., 2009

2008
Ant-based IP traceback.
Expert Syst. Appl., 2008

Defending On-Line Web Application Security with User-Behavior Surveillance.
Proceedings of the The Third International Conference on Availability, 2008

2007
Information Exchange Mechanism Based on Reputation in Mobile P2P Networks.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Tracing Denial of Service Origin: Ant Colony Approach.
Proceedings of the Applications of Evolutionary Computing, 2006


  Loading...