Tao Ban

Orcid: 0000-0002-9616-3212

According to our database1, Tao Ban authored at least 114 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
IoT malware classification based on reinterpreted function-call graphs.
Comput. Secur., 2023

Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access, 2023

Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach.
IEEE Access, 2023

Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Machine Learning-Based Security Alert Screening with Focal Loss.
Proceedings of the IEEE International Conference on Big Data, 2023

Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

Hybrid Explainable Intrusion Detection System: Global vs. Local Approach.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023

2022
Detecting Android Malware and Classifying Its Families in Large-scale Datasets.
ACM Trans. Manag. Inf. Syst., 2022

Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems.
IEEE Access, 2022

Malicious Packet Classification Based on Neural Network Using Kitsune Features.
Proceedings of the Intelligent Systems and Pattern Recognition, 2022

IoT Botnet Detection Based on the Behaviors of DNS Queries.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Critical-Threat-Alert Detection using Online Machine Learning.
Proceedings of the IEEE International Conference on Big Data, 2022

Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021

On-premises Analysis of Advanced Threat Prevention Appliances.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Combat Security Alert Fatigue with AI-Assisted Techniques.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization.
Proceedings of the 20th IEEE International Conference on Trust, 2021

IoT Malware Detection Using Function-Call-Graph Embedding.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020

A study of IoT malware activities using association rule learning for darknet sensor data.
Int. J. Inf. Sec., 2020

Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020

Cross Platform IoT- Malware Family Classification based on Printable Strings.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis.
Proceedings of the 19th IEEE International Conference on Trust, 2020

ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

CDMC'19 - The 10th International Cybersecurity Data Mining Competition.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Port-Piece Embedding for Darknet Traffic Features and Clustering of Scan Attacks.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

IoT-Malware Detection Based on Byte Sequences of Executable Files.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices.
IEICE Trans. Inf. Syst., 2019

Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Establishing Trusted and Timely Information Source using Social Media Services.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

Malicious URL Linkage Analysis and Common Pattern Discovery.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Merging weighted SVMs for parallel incremental learning.
Neural Networks, 2018

Automatically Generating Malware Analysis Reports Using Sandbox Logs.
IEICE Trans. Inf. Syst., 2018

Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering.
Appl. Soft Comput., 2018

Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A Darknet Traffic Analysis for IoT Malwares Using Association Rule Learning.
Proceedings of the INNS Conference on Big Data and Deep Learning 2018, 2018

Online Max-flow Learning via Augmenting and De-augmenting Path.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Employ Decision Values for Soft-Classifier Evaluation with Crispy References.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A Cross-Platform Study on IoT Malware.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

Evaluating Disassembly-Code Based Similarity between IoT Malware Samples.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis.
Wirel. Pers. Commun., 2017

Goods recommendation based on retail knowledge in a Neo4j graph database combined with an inference mechanism implemented in jess.
Proceedings of the 2017 IEEE SmartWorld, 2017

Practical darknet traffic analysis: Methods and case studies.
Proceedings of the 2017 IEEE SmartWorld, 2017

Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Detection of Botnet Activities Through the Lens of a Large-Scale Darknet.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Incremental and Decremental Max-Flow for Online Semi-Supervised Learning.
IEEE Trans. Knowl. Data Eng., 2016

Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Distributed incremental wLPSVM learning.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Feature subset selection by SVM ensemble.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

A neural network model for detecting DDoS attacks using darknet traffic features.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

The Usability of Metadata for Android Application Analysis.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Integration of Multi-modal Features for Android Malware Detection Using Linear SVM.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications.
Secur. Commun. Networks, 2015

Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features.
Proceedings of the INNS Conference on Big Data 2015, 2015

A federated network online network traffics analysis engine for cybersecurity.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

A study on association rule mining of darknet big data.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

An autonomous online malicious spam email detection system using extended RBF network.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Fine-Grained Risk Level Quantication Schemes Based on APK Metadata.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Adaptive DDoS-Event Detection from Big Darknet Traffic Data.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

2014
An Accurate Packer Identification Method Using Support Vector Machine.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Learner-Independent Knowledge Transfer Approach to Multi-task Learning.
Cogn. Comput., 2014

Detecting Malicious Spam Mails: An Online Machine Learning Approach.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Dynamic class imbalance learning for incremental LPSVM.
Neural Networks, 2013

User Travelling Pattern Prediction via Indistinct Cellular Data Mining.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Chunk incremental IDR/QR LDA learning.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Referential kNN Regression for Financial Time Series Forecasting.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

An incremental learning approach to continuous image change detection.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Towards Cost-Effective P2P Traffic Classification in Cloud Environment.
IEICE Trans. Inf. Syst., 2012

A study on cost-effective P2P traffic classification.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

SDE-Driven Service Provision Control.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Behavior Analysis of Long-term Cyber Attacks in the Darknet.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

A Fine-Grained Classification Approach for the Packed Malicious Code.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Personalized mode transductive spanning SVM classification tree.
Inf. Sci., 2011

Mining interlacing manifolds in high dimensional spaces.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Practical network traffic analysis in P2P environment.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Network Flow Classification Based on the Rhythm of Packets.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Entropy Based Discriminators for P2P Teletraffic Characterization.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

2010
Incremental and decremental LDA learning with applications.
Proceedings of the International Joint Conference on Neural Networks, 2010

Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing.
Proceedings of the Neural Information Processing. Models and Applications, 2010

A Malware Detection Algorithm Based on Multi-view Fusion.
Proceedings of the Neural Information Processing. Models and Applications, 2010

A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis.
Proceedings of the Neural Information Processing. Models and Applications, 2010

2009
Guest editorial: Thematic issue on 'Adaptive Soft Computing Techniques and Applications'.
Memetic Comput., 2009

A new approach to discover interlacing data structures in high-dimensional space.
J. Intell. Inf. Syst., 2009

Sparse kernel feature analysis using FastMap and its variants.
Proceedings of the International Joint Conference on Neural Networks, 2009

A Provably Secure Two-Party Attribute-Based Key Agreement Protocol.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Identity Based Authenticated Key Agreement for Tree-Based Group.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

String Kernel Based SVM for Internet Security Implementation.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

Hierarchical Core Vector Machines for Network Intrusion Detection.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

Spanning SVM Tree for Personalized Transductive Learning.
Proceedings of the Artificial Neural Networks, 2009

2008
G-Means: A Clustering Algorithm for Intrusion Detection.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

2007
Using Genetic Algorithm to Balance the D-Index Algorithm for Metric Search.
Proceedings of the Neural Information Processing, 14th International Conference, 2007

2006
Implementing Multi-class Classifiers by One-class Classification Methods.
Proceedings of the International Joint Conference on Neural Networks, 2006


  Loading...