Hahn-Ming Lee

According to our database1, Hahn-Ming Lee authored at least 90 papers between 1989 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Identifying HID-based attacks through process event graph using guilt-by-association analysis.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

2018
Automated estimation of item difficulty for multiple-choice tests: An application of word embedding techniques.
Inf. Process. Manage., 2018

Implementation of adversarial scenario to malware analytic.
Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, 2018

Detection of DNS Tunneling by Feature-Free Mechanism.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Ziffersystem: A novel malware distribution detection system.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
A responsive probing approach to detect dynamic intrusion in a MANET.
Proceedings of the 7th International Conference on Information, 2016

2015
JSOD: JavaScript obfuscation detector.
Security and Communication Networks, 2015

DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2014
Stock Trend Prediction by Using K-Means and AprioriAll Algorithm for Sequential Chart Pattern Mining.
J. Inf. Sci. Eng., 2014

Detecting Spam on Twitter via Message-Passing Based on Retweet-Relation.
Proceedings of the Technologies and Applications of Artificial Intelligence, 2014

Heap Spraying Revelation: Heap-spraying Detection based on Minimal Length Sequence and Argument Analysis.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Using a Paper-based Digital Pen for Supporting English Courses in Regular Classrooms to Improve Reading Fluency.
IJHAC, 2013

DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2013

Larbac: enforcement of location constraints for location-aware RBAC system in mobile environment.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection.
J. Inf. Sci. Eng., 2012

Cloud Computing in Taiwan.
IEEE Computer, 2012

Mining Publication Records on Personal Publication Web Pages Based on Conditional Random Fields.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Android Malware Detection via a Latent Network Behavior Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Stock Trend Prediction by Sequential Chart Pattern via K-Means and AprioriAll Algorithm.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2012

GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Android privacy.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

A novel approach for re-authentication protocol using personalized information.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

Real-Time Fast-Flux Identification via Localized Spatial Geolocation Detection.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

DroidMat: Android Malware Detection through Manifest and API Calls Tracing.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Adaptive e-mails intention finding system based on words social networks.
J. Network and Computer Applications, 2011

Using Web-Mining for Academic Measurement and Scholar Recommendation in Expert Finding System.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

VoIPS: VoIP Secure Encryption VoIP Solution.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2011

Automatic English-Chinese name translation by using Web-Mining and phonetic similarity.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

RePEF - A system for Restoring Packed Executable File for malware analysis.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

AOS: An optimized sandbox method used in behavior-based malware detection.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

How to solve collision and authentication issues using RFID protocol technology.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

Mining Fuzzy Domain Ontology Based on Concept Vector from Wikipedia Category Network.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011

2010
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Proceedings of the Proceedings Fourth International Workshop on Testing, 2010

SBAD: Sequence Based Attack Detection via Sequence Comparison.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

Part-of-speech tagging for Chinese unknown words in a domain-specific small corpus using morphological and contextual rules.
Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, 2010

Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Building GML-native web-based geographic information systems.
Computers & Geosciences, 2009

Two novel feature selection approaches for web page classification.
Expert Syst. Appl., 2009

A Reviewer Recommendation System Based on Collaborative Intelligence.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Semi-supervised co-training and active learning based approach for multi-view intrusion detection.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

2008
EFS: Expert Finding System based on Wikipedia link pattern analysis.
Proceedings of the IEEE International Conference on Systems, 2008

Author Name Disambiguation for Citations Using Topic and Web Correlation.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2008

2007
Mining Navigation Behaviors for Term Suggestion of Search Engines.
J. Inf. Sci. Eng., 2007

Association Thesaurus Construction for Interactive Query Expansion Based on Association Rule Mining.
J. Inf. Sci. Eng., 2007

Mining Translations of Chinese Names from Web Corpora Using a Query Expansion Technique and Support Vector Machine.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

2006
An intelligent web-page classifier with fair feature-subset selection.
Eng. Appl. of AI, 2006

An instance-based learning approach based on grey relational structure.
Appl. Intell., 2006

Web Appearance Disambiguation of Personal Names Based on Network Motif.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

Network Motif Model: An Efficient Approach for Extracting Features from Relational Data.
Proceedings of the IEEE International Conference on Systems, 2006

Enhancing Entropy-based Informative Block Identification Using Block Preclustering Technology.
Proceedings of the IEEE International Conference on Systems, 2006

Semantic Similarity Measurement of Chinese Financial News Titles Based on Event Frame Extracting.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

Associating Expertized Information to Alleviate Sparsity Problem in Personalization.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

Efficient GML-native processors for web-based GIS: techniques and tools.
Proceedings of the 14th ACM International Symposium on Geographic Information Systems, 2006

E2D: A Novel Tool for Annotating Protein Domains in Expressed Sequence Tags.
Proceedings of the 2006 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, 2006

2005
Personalized e-learning system using Item Response Theory.
Computers & Education, 2005

Personalized Course Navigation Based on Grey Relational Analysis.
Appl. Intell., 2005

A Hierarchical Neural Network Document Classifier with Linguistic Feature Selection.
Appl. Intell., 2005

Trading Decision Maker: Stock Trading Decision by Price Series Smoothing and Tendency Transition Inference.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Prefiltering techniques for efficient XML document processing.
Proceedings of the 2005 ACM Symposium on Document Engineering, 2005

2004
A Grey-Based Nearest Neighbor Approach for Missing Attribute Value Prediction.
Appl. Intell., 2004

QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

Fast structural query with application to chinese treebank sentence retrieval.
Proceedings of the 2004 ACM Symposium on Document Engineering, 2004

2003
A self-organizing HCMAC neural-network classifier.
IEEE Trans. Neural Networks, 2003

A Novel Partial-Memory Learning Algorithm Based on Grey Relational Structure.
Proceedings of the Advances in Intelligent Data Analysis V, 2003

2002
Inconsistency Resolution and Rule Insertion for Fuzzy Rule-Based Systems.
J. Inf. Sci. Eng., 2002

An Efficient Gradient Forecasting Search Method Utilizing the Discrete Difference Equation Prediction Model.
Appl. Intell., 2002

2001
An efficient fuzzy classifier with feature selection based on fuzzy entropy.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2001

Learning efficiency improvement of back-propagation algorithm by error saturation prevention method.
Neurocomputing, 2001

Interactive Query Expansion Based on Fuzzy Association Thesaurus for Web Information Retrieval.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

2000
A Neural Network Document Classifier with Linguistic Feature Selection.
Proceedings of the Intelligent Problem Solving, 2000

1999
Learning efficiency improvement of back propagation algorithm by error saturation prevention method.
Proceedings of the International Joint Conference Neural Networks, 1999

1998
A neural network classifier with disjunctive fuzzy information.
Neural Networks, 1998

A preclassification Method for Handwritten Chinese Character Recognition via Fuzzy Rules and Seart Neural Net.
IJPRAI, 1998

A fuzzy rule-based system for handwritten Chinese characters recognition based on radical extraction.
Fuzzy Sets and Systems, 1998

Handwritten Chinese Character Recognition Based on Primitive and Fuzzy Features via the SEART Neural Net Model.
Appl. Intell., 1998

Efficiency validation of fuzzy domain theories using a neural network model.
Proceedings of the Tenth IEEE International Conference on Tools with Artificial Intelligence, 1998

1997
A Fuzzy Neural Network Model for Fuzzy Rule Verification, Refinement and Generation.
J. Inf. Sci. Eng., 1997

A multiclass neural network classifier with fuzzy teaching inputs.
Fuzzy Sets and Systems, 1997

1996
Supervised Extended ART: A Fast Neural Network Classifier Trained by Combining Supervised and Unsupervised Learning.
Appl. Intell., 1996

1995
mwKAT: A Meta-Tool-Generated Knowledge Acquisition Tool for Multimedia Workstations Development.
Appl. Intell., 1995

1993
An Architecture of Neural Network for Fuzzy Teaching Inputs.
Proceedings of the Fifth International Conference on Tools with Artificial Intelligence, 1993

1989
A Neural Network Processing Methodology for Zero-One Knapsack Problems.
J. Inf. Sci. Eng., 1989

Neural network processing through energy minimization with learning ability to the multiconstraint zero-one knapsack problem.
Proceedings of the IEEE International Workshop on Tools for Artificial Intelligence: Architectures, 1989


  Loading...