Ming-Yang Su

According to our database1, Ming-Yang Su authored at least 47 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
BERT-Based Approaches to Identifying Malicious URLs.
Sensors, October, 2023

Applying Super Resolution and Optical Flow to Implement a Roll Call System for a Small Classroom by Webcam.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

2019
Android Malware Detection Approaches in Combination with Static and Dynamic Features.
Int. J. Netw. Secur., 2019

Permission Abusing by Ad Libraries of Smartphone Apps.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

2018
Identifying Ad Libraries by Their Network Behavior Patterns.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Applying episode mining and pruning to identify malicious online attacks.
Comput. Electr. Eng., 2017

Machine learning on merging static and dynamic features to identify malicious mobile apps.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

2016
Detection of Android malware: Combined with static analysis and dynamic analysis.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

Detection of android malware by static analysis on permissions and sensitive functions.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

2015
An Approach to Resisting Malformed and Flooding Attacks on SIP Servers.
J. Networks, 2015

Using data mining approaches to identify voice over IP spam.
Int. J. Commun. Syst., 2015

A resilient routing approach for Mobile Ad Hoc Networks.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

2014
Permission-based malware detection mechanisms for smart phones.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
An efficient and secure approach for a cloud collaborative editing.
J. Netw. Comput. Appl., 2013

2012
A study on the data privacy and operation performance for cloud collaborative editing systems.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
A study on the prevention of sniffing nodes in mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2011

Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification.
J. Netw. Comput. Appl., 2011

Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers.
Expert Syst. Appl., 2011

A novel intrusion detection system based on hierarchical clustering and support vector machines.
Expert Syst. Appl., 2011

Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems.
Comput. Commun., 2011

Genetic-fuzzy association rules for network intrusion detection systems.
Proceedings of the FUZZ-IEEE 2011, 2011

The Research of Locating Methods for Mobile Stations Based on IEEE 802.16e Multi-hop WMANs.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Discovery and prevention of attack episodes by frequent episodes mining and finite state machines.
J. Netw. Comput. Appl., 2010

An online response system for anomaly traffic by incremental mining with genetic optimization.
J. Commun. Networks, 2010

WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks.
Comput. Secur., 2010

Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes.
Proceedings of the Wireless Algorithms, 2010

Using Genetic Algorithm to Improve an Online Response System for Anomaly Traffic by Incremental Mining.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

2009
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach.
Comput. Secur., 2009

Design of an adaptive positioning system based on WiFi radio signals.
Comput. Commun., 2009

Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Anomaly detection for web server based on smooth support vector machine.
Comput. Syst. Sci. Eng., 2008

A real-time network intrusion detection system based on incremental mining approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN.
Proceedings of the Intelligence and Security Informatics, 2008

Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
An Efficient and Secured Internet Key Exchange Protocol Design.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
A Surveillance Spyware Detection System Based on Data Mining Methods.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
An E-Mail Client Implementation with Spam Filtering and Security Mechanisms.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2001
A general broadcasting scheme for recursive networks with complete connection.
Parallel Comput., 2001

2000
Node-disjoint paths in incomplete WK-recursive networks.
Parallel Comput., 2000

1999
Broadcasting on Incomplete WK-Recursive Networks.
J. Parallel Distributed Comput., 1999

1998
Topological properties of incomplete WK-recursive networks.
Networks, 1998

A General Broadcasting Scheme for Recursive Networks with Complete Connection.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

1997
A Shortest-Path Routing Algorithm for Incomplete WK-Recursive Networks.
IEEE Trans. Parallel Distributed Syst., 1997

1996
A linear-time algorithm for computing the diameters of the incomplete WK-recursive networks.
Proceedings of the 1996 International Conference on Parallel and Distributed Systems (ICPADS '96), 1996

1994
A Multicast Algorithm for Hypercube Multiprocessors.
Parallel Algorithms Appl., 1994


  Loading...