Yeali S. Sun

According to our database1, Yeali S. Sun authored at least 96 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attention-Based API Locating for Malware Techniques.
IEEE Trans. Inf. Forensics Secur., 2024

2022
Open Source Intelligence for Malicious Behavior Discovery and Interpretation.
IEEE Trans. Dependable Secur. Comput., 2022

Learning Dynamic Malware Representation from Common Behavior.
J. Inf. Sci. Eng., 2022

Building Cybersecurity Ontology for Understanding and Reasoning Adversary Tactics and Techniques.
Proceedings of the IEEE International Conference on Big Data, 2022

2020
Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling.
IEEE Trans. Inf. Forensics Secur., 2020

2019
A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Bringing personalized learning into computer-aided question generation.
CoRR, 2018

Development and Evaluation of a Personalized Computer-aided Question Generation for English Learners to Improve Proficiency and Correct Mistakes.
CoRR, 2018

Characterizing the Influence of Features on Reading Difficulty Estimation for Non-native Readers.
CoRR, 2018

ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

The Influence of Self-Regulated Learning Support and Prior Knowledge on Learning Mathematics.
Proceedings of the 18th IEEE International Conference on Advanced Learning Technologies, 2018

ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Virtual Machine Introspection Based Malware Behavior Profiling and Family Grouping.
CoRR, 2017

Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract).
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

An Investigation of the Influence of Drug Addiction on Learning Behaviors in a Game-Based Learning Environment.
Proceedings of the 17th IEEE International Conference on Advanced Learning Technologies, 2017

2016
Patching assignment optimization for security vulnerabilities.
Int. Arab J. Inf. Technol., 2016

Behavior grouping of Android malware family.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Design of an Online Multimedia Learning System for Improving Students' Perceptions of English Language Learning.
Proceedings of the 16th IEEE International Conference on Advanced Learning Technologies, 2016

2015
A Study of a Life Logging Smartphone App and Its Power Consumption Observation in Location-Based Service Scenario.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Resource management issues in 5G ultra dense smallcell networks.
Proceedings of the 2015 International Conference on Information Networking, 2015

Profiling temporal event behavior for demand prediction in cloud application performance management.
Proceedings of the IEEE International Conference on Communication, 2015

A Workload, Performance and Resource Usage.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

2014
A Two-Stage Link Scheduling Scheme for Variable-Bit-Rate Traffic Flows in Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2014

Seamless Handover for High-Speed Trains Using Femtocell-Based Multiple Egress Network Interfaces.
IEEE Trans. Wirel. Commun., 2014

A novel network mobility management scheme supporting seamless handover for high-speed trains.
Comput. Commun., 2014

A tag based learning approach to knowledge acquisition for constructing prior knowledge and enhancing student reading comprehension.
Comput. Educ., 2014

Generating Comprehension Questions Using Paraphrase.
Proceedings of the Technologies and Applications of Artificial Intelligence, 2014

TEDQuiz: Automatic Quiz Generation for TED Talks Video Clips to Assess Listening Comprehension.
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014

2013
Protocol and architecture supports for network mobility with QoS-handover for high-velocity vehicles.
Wirel. Networks, 2013

A Secure Proxy-Based Cross-Domain Communication for Web Mashup.
J. Web Eng., 2013

A novel approach to evaluate software vulnerability prioritization.
J. Syst. Softw., 2013

Distributed Agent-based IP Location System Framework Design.
Int. J. Online Biomed. Eng., 2013

A scalable network forensics mechanism for stealthy self-propagating attacks.
Comput. Commun., 2013

Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments.
Proceedings of the Network and System Security - 7th International Conference, 2013

Spectrum analysis for detecting slow-paced persistent activities in network security.
Proceedings of IEEE International Conference on Communications, 2013

A cooperative botnet profiling and detection in virtualized environment.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A Workload Analysis of Live Event Broadcast Service in Cloud.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services.
J. Commun., 2012

A Hybrid Tag-Based Recommendation Mechanism to Support Prior Knowledge Construction.
Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, 2012

2011
A Scalable Healthcare Information System Based on a Service-oriented Architecture.
J. Medical Syst., 2011

Collaborative scheme for VoIP traceback.
Digit. Investig., 2011

Dynamic bandwidth reservation scheme in 802.11 and 802.16 interworking networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Adaptive On-The-Go Scheduling for End-to-End Delay Control in TDMA-Based Wireless Mesh Networks.
Proceedings of the NETWORKING 2011, 2011

A Robust Estimation Scheme of Reading Difficulty for Second Language Learners.
Proceedings of the ICALT 2011, 2011

A Study on an Automatic Early-Alert Mechanism for a Tag-based Learning Environment: Development of a Teaching Support Platform Based on a Tag-based Knowledge Acquisition Approach.
Proceedings of the ICALT 2011, 2011

A Spectral Efficient and Fair User-Centric Spectrum Allocation Approach for Downlink Transmissions.
Proceedings of the Global Communications Conference, 2011

Optimal Incentive-Compatible Pricing for Dynamic Bandwidth Trading and Allocation in Efficient Spectrum Management.
Proceedings of the Global Communications Conference, 2011

A Secure Proxy-Based Cross-Domain Communication for Web Mashups.
Proceedings of the 9th IEEE European Conference on Web Services, 2011

GPS Data Based Urban Guidance.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

A Novel Approach for Developing Automatic Knowledge Construction and Diagnostic System for Tag-Based Learning Environment.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
Extending the TAM model to explore the factors that affect Intention to Use an Online Learning Community.
Comput. Educ., 2010

A novel approach for enhancing student reading comprehension and assisting teacher assessment of literacy.
Comput. Educ., 2010

Behavior profiling for robust anomaly detection.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Cross-level behavioral analysis for robust early intrusion detection.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

A Design for Integration of Web 2.0 and an Online Learning Community: A Pilot Study for IWiLL 2.0.
Proceedings of the ICALT 2010, 2010

2009
TCP-sleek channel access scheduling for multi-hop mesh networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

A User-Decided Service Model and Resource Management in a Cooperative WiMAX/HSDPA Network.
Proceedings of IEEE International Conference on Communications, 2009

2008
Enhanced bulk scheduling for supporting delay sensitive streaming applications.
Comput. Networks, 2008

A network mobility management scheme for fast QoS handover.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

HiMIP-NEMO: Combining Cross-Layer Network Mobility Management and Resource Allocation for Fast QoS-Handovers.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

A Distributed Channel Access Scheduling Scheme with Clean-Air Spatial Reuse for Wireless Mesh Networks.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

A Collaborative Forensics Framework for VoIP Services in Multi-network Environments.
Proceedings of the Intelligence and Security Informatics, 2008

Assessment of an Online Learning Community from Technology Acceptance Model in Education.
Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies, 2008

2007
Multi-stage two-leg bandwidth reservation and admission control for advance reservations with uncertain service duration.
Int. J. Commun. Syst., 2007

WF<sup>2</sup>Q-M: Worst-case fair weighted fair queueing with maximum rate control.
Comput. Networks, 2007

A new per-class flow fixed proportional differentiated service for multi-service wireless LAN.
Comput. Networks, 2007

TCP Throughput Enhancement over Wireless Mesh Networks.
IEEE Commun. Mag., 2007

2006
MTRA: An on-line hose-model VPN provisioning algorithm.
Telecommun. Syst., 2006

Traffic Engineering for Provisioning Restorable Hose-Model VPNs.
IEICE Trans. Commun., 2006

The Design of a Web-based Learning Platform: A Case Study in Taiwan.
Proceedings of the Learning by Effective Utilization of Technologies: Facilitating Intercultural Understanding, 2006

Exploring the Learning Effect of a Web-based Learning Community on EMBA Students.
Proceedings of the Learning by Effective Utilization of Technologies: Facilitating Intercultural Understanding, 2006

A Study of the Web-based Learning System for Supply Chain Management Course Teaching.
Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, 2006

Bulk Scheduling for Delay Sensitive Streaming Applications.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Scalable Multi-tier Architecture for the National Taiwan University Hospital Information System based on HL7 Standard.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

2005
A framework of handoffs in wireless overlay networks based on mobile IPv6.
IEEE J. Sel. Areas Commun., 2005

Progressive Analysis Scheme for Web Document Classification.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

Content-Aware Automatic QoS Provisioning for UpnP AV-Based Multimedia Services over Wireless LANs.
Proceedings of the Computational Science, 2005

Fast and secure universal roaming service for mobile Internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Traffic engineering for hose-model VPN provisioning.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

On the On-Line Hose-Model VPN Provisioning.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

2004
Automatic topics discovery from hyperlinked documents.
Inf. Process. Manag., 2004

Management of abusive and unfair Internet access by quota-based priority control.
Comput. Networks, 2004

Fair and Performance Guaranteed Methods for Flat-Rate Unlimited Access Service Plan.
Proceedings of the NETWORKING 2004, 2004

2003
On Maximum Rate Control of Weighted Fair Scheduling for Transactional Systems.
Proceedings of the 24th IEEE Real-Time Systems Symposium (RTSS 2003), 2003

Priority-Based Internet Access Control for Fairness Improvement and Abuse Reduction.
Proceedings of the Quality of Service in Multiservice IP Networks, 2003

Life Cycle Modeling of News Events Using Aging Theory.
Proceedings of the Machine Learning: ECML 2003, 2003

2002
PVA: A Self-Adaptive Personal View Agent.
J. Intell. Inf. Syst., 2002

Predictive flow control for TCP-friendly end-to-end real-time video on the Internet.
Comput. Commun., 2002

Admission Control and Capacity Management for Advance Reservations with Uncertain Service Duration.
Proceedings of the NETWORKING 2002, 2002

2001
Dynamic resizing of utilization target in measurement-based admission control.
Comput. Commun., 2001

PVA: a self-adaptive personal view agent system.
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, 2001

2000
Proportional delay differentiation service based on weighted fair queuing.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1996
Performance Analysis of Application-Level Traffic Shaping in a Real-Time Multimedia Conferencing System on Ethernets.
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996

1989
SFPS: A Synchronous Fast Packet Switching Architecture for Very High Speeds.
Proceedings of the Proceedings IEEE INFOCOM '89, 1989

1988
A virtual data queue access scheme for integrated LANs.
Proceedings of the Computer Communication Technologies for the 90's, Proceedings of the Ninth International Conference on Computer Communication, Tel Aviv, Israel, October 30, 1988


  Loading...