Ken Chiang

According to our database1, Ken Chiang authored at least 7 papers between 2007 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Semi-chronic chamber system for simultaneous subdural electrocorticography, local field potentials, and spike recordings.
Proceedings of the 7th International IEEE/EMBS Conference on Neural Engineering, 2015

2013
Streaming Malware Classification in the Presence of Concept Drift and Class Imbalance.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

Host-Based Anomaly Detection Using Learning Techniques.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

2009
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.
Proceedings of the Information Security, 11th International Conference, 2008

Detecting sensitive data exfiltration by an insider attack.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
A Case Study of the Rustock Rootkit and Spam Bot.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007


  Loading...