Shin-Ying Huang

According to our database1, Shin-Ying Huang authored at least 28 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing Mathematics Learning Outcomes through a Flipped Classroom Grouping Mechanism Informed by Self-study Habits: Utilizing iPad Screen Time Data.
Proceedings of the Innovative Technologies and Learning - 6th International Conference, 2023

2020
IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information.
IEICE Trans. Commun., 2020

Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis.
Proceedings of the 19th IEEE International Conference on Trust, 2020

POSTER: Dynamic Software Vulnerabilities Threat Prediction through Social Media Contextual Analysis.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices.
IEICE Trans. Inf. Syst., 2019

A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Malicious URL Linkage Analysis and Common Pattern Discovery.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A multi-channel cybersecurity news and threat intelligent engine - SecBuzzer.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Detection of DNS Tunneling by Feature-Free Mechanism.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Ziffersystem: A novel malware distribution detection system.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

A Parallel Majority Learning Algorithm for Anomaly Detection.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Exploring the online underground marketplaces through topic-based social network and clustering.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Outlier detection in the concept drifting environment.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

2015
Network-traffic anomaly detection with incremental majority learning.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

2014
A revised discrete particle swarm optimization algorithm for permutation flow-shop scheduling problem.
Soft Comput., 2014

Topological pattern discovery and feature extraction for fraudulent financial reporting.
Expert Syst. Appl., 2014

Resistant learning on the envelope bulk for identifying anomalous patterns.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Event Pattern Discovery on IDS Traces of Cloud Services.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
Clustering iOS executable using self-organizing maps.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Network Forensic Analysis Using Growing Hierarchical SOM.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Network traffic anomaly detection based on growing hierarchical SOM.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Unsupervised Neural Networks Approach for Understanding Fraudulent Financial Reporting.
Ind. Manag. Data Syst., 2012

The prediction approach with Growing Hierarchical Self-Organizing Map.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

2009
Exploring Fraudulent Financial Reporting with GHSOM.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

2008
The rule-extraction through the preimage analysis.
Proceedings of the International Joint Conference on Neural Networks, 2008


  Loading...