Philip Chan

Orcid: 0000-0002-3878-4205

Affiliations:
  • Florida Institute of Technology, Department of Computer Sciences, Melbourne, FL, USA


According to our database1, Philip Chan authored at least 64 papers between 1989 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Feature Decoupling in Self-supervised Representation Learning for Open Set Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2023

GII: A Unified Approach to Representation Learning in Open Set Recognition with Novel Category Discovery.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

2022
Representation Learning with Function Call Graph Transformations for Malware Open Set Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2022

Self-supervised Detransformation Autoencoder for Representation Learning in Open Set Recognition.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
MMF: A Loss Extension for Feature Learning in Open Set Recognition.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

2020
Learning a Neural-network-based Representation for Open Set Recognition.
Proceedings of the 2020 SIAM International Conference on Data Mining, 2020

Unsupervised Open Set Recognition using Adversarial Autoencoders.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

2018
Estimating effectiveness of twitter messages with a personalized machine learning approach.
Knowl. Inf. Syst., 2018

Detecting Harmful Hand Behaviors with Machine Learning from Wearable Motion Sensor Data.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

Using A Personalized Anomaly Detection Approach with Machine Learning to Detect Stolen Phones.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

Learning to Identify Known and Unknown Classes: A Case Study in Open World Malware Classification.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

Identifying Pros and Cons of Product Aspects Based on Customer Reviews.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Machine Learning for IT Security.
Proceedings of the Encyclopedia of Machine Learning and Data Mining, 2017

Malware classification using static analysis based features.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Scalable Function Call Graph-based Malware Classification.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Mining pros and cons of actions from social media for decision support.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Improving efficiency of maximizing spread in the flow authority model for large sparse networks.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2014
Semantic Search Techniques for Learning Smaller Boolean Expression Trees in Genetic Programming.
Int. J. Comput. Intell. Appl., 2014

An Analysis of Instance Selection for Neural Networks to Improve Training Speed.
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014

2012
Estimating Hospital Admissions with a Randomized Regression Approach.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

2010
Machine Learning for IT Security.
Proceedings of the Encyclopedia of Machine Learning, 2010

Increasing coverage to improve detection of network and host anomalies.
Mach. Learn., 2010

Incrementally Learning Rules for Anomaly Detection.
Proceedings of the Twenty-Third International Florida Artificial Intelligence Research Society Conference, 2010

2009
Tracking User Mobility to Detect Suspicious Behavior.
Proceedings of the SIAM International Conference on Data Mining, 2009

2008
Learning implicit user interest hierarchy for context in personalization.
Appl. Intell., 2008

2007
Toward accurate dynamic time warping in linear time and space.
Intell. Data Anal., 2007

Intelligent Systems at Florida Tech.
IEEE Intell. Informatics Bull., 2007

Weighting versus pruning in rule validation for detecting network and host anomalies.
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007

2006
Machine Learning for Computer Security.
J. Mach. Learn. Res., 2006

On the Learning of System Call Attributes for Host-based Anomaly Detection.
Int. J. Artif. Intell. Tools, 2006

2005
Data mining methods for anomaly detection KDD-2005 workshop report.
SIGKDD Explor., 2005

Learning States and Rules for Detecting Anomalies in Time Series.
Appl. Intell., 2005

Implicit Indicators for Interesting Web Pages.
Proceedings of the WEBIST 2005, 2005

Personalized Search Results with User Interest Hierarchies Learnt from Bookmarks.
Proceedings of the Advances in Web Mining and Web Usage Analysis, 2005

Modeling Multiple Time Series for Anomaly Detection.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Learning Useful System Call Attributes for Anomaly Detection.
Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, 2005

2004
Using artificial anomalies to detect unknown and known network intrusions.
Knowl. Inf. Syst., 2004

MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

Motif-Oriented Representation of Sequences for a Host-Based Intrusion Detection System.
Proceedings of the Innovations in Applied Artificial Intelligence, 2004

Determining the Number of Clusters/Segments in Hierarchical Clustering/Segmentation Algorithms.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

Identifying Variable-Length Meaningful Phrases with Correlation Functions.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

Learning States and Rules for Time Series Anomaly Detection.
Proceedings of the Seventeenth International Florida Artificial Intelligence Research Society Conference, 2004

2003
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Learning implicit user interest hierarchy for context in personalization.
Proceedings of the 8th International Conference on Intelligent User Interfaces, 2003

Learning Rules for Anomaly Detection of Hostile Network Traffic.
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 2003

2002
Learning nonstationary models of normal network traffic for detecting novel attacks.
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002

2001
Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project.
SIGMOD Rec., 2001

1999
Guest Editors' Introduction.
Mach. Learn., 1999

Distributed data mining in credit card fraud detection.
IEEE Intell. Syst., 1999

Constructing Web User Profiles: A non-invasive Learning Approach.
Proceedings of the Web Usage Analysis and User Profiling, 1999

AdaCost: Misclassification Cost-Sensitive Boosting.
Proceedings of the Sixteenth International Conference on Machine Learning (ICML 1999), Bled, Slovenia, June 27, 1999

1998
KDD Cup 1999 Data.
Dataset, December, 1998

Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection.
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998

1997
On the Accuracy of Meta-Learning for Scalable Data Mining.
J. Intell. Inf. Syst., 1997

JAM: Java Agents for Meta-Learning over Distributed Databases.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (KDD-97), 1997

1996
Sharing Learned Models among Remote Database Partitions by Local Meta-Learning.
Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), 1996

1995
Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning.
Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD-95), 1995

A Comparative Evaluation of Voting and Meta-learning on Partitioned Data.
Proceedings of the Machine Learning, 1995

1993
Systems for Knowledge Discovery in Databases.
IEEE Trans. Knowl. Data Eng., 1993

Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis.
Proceedings of the 1st International Conference on Intelligent Systems for Molecular Biology, 1993

Experiments on Multi-Strategy Learning by Meta-Learning.
Proceedings of the CIKM 93, 1993

1991
PARULE: Parallel Rule Processing Using Meta-rules for Redaction.
J. Parallel Distributed Comput., 1991

1990
Statistical guidance in symbolic learning.
Ann. Math. Artif. Intell., 1990

1989
Inductive Learning with BCT.
Proceedings of the Sixth International Workshop on Machine Learning (ML 1989), 1989


  Loading...