Jonathan Pan

According to our database1, Jonathan Pan authored at least 20 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Audio Simulation for Sound Source Localization in Virtual Evironment.
CoRR, 2024

Enhancing Reasoning Capacity of SLM using Cognitive Enhancement.
CoRR, 2024

An Integrated Smart Contract Vulnerability Detection Tool Using Multi-Layer Perceptron on Real-Time Solidity Smart Contracts.
IEEE Access, 2024

2023
RAGLog: Log Anomaly Detection using Retrieval Augmented Generation.
CoRR, 2023

A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis.
CoRR, 2023

A Foundation Model Approach to Detect Machine Generated Text.
Proceedings of the IEEE Region 10 Conference, 2023

2022
Active Meta-Learner for Log Analysis.
CoRR, 2022

Reinforcement Learning Approach to Solve Dynamic Bi-objective Police Patrol Dispatching and Rescheduling Problem.
Proceedings of the Thirty-Second International Conference on Automated Planning and Scheduling, 2022

2021
Iot Network Behavioral Fingerprint Inference With Limited Network Traces For Cyber Investigation.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2021

2020
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates.
IACR Cryptol. ePrint Arch., 2020

IoT Network Behavioral Fingerprint Inference with Limited Network Trace for Cyber Investigation: A Meta Learning Approach.
CoRR, 2020

Blackbox Trojanising of Deep Learning Models: Using Non-Intrusive Network Structure and Binary Alterations.
Proceedings of the 2020 IEEE Region 10 Conference, 2020

2019
A Novel Procedure for Font Recognition through Deep Learning.
Proceedings of the 2019 IEEE International Conference on Cybernetics and Intelligent Systems (CIS) and IEEE Conference on Robotics, 2019

Physical Integrity Attack Detection of Surveillance Camera with Deep Learning based Video Frame Interpolation.
Proceedings of the 2019 IEEE International Conference on Internet of Things and Intelligence System, 2019

2018
Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools.
CoRR, 2018

2017
Encryption scheme classification: a deep learning approach.
Int. J. Electron. Secur. Digit. Forensics, 2017

2016
Data farming for cyber security: an agent-based modelling approach.
Int. J. Inf. Priv. Secur. Integr., 2016

2015
Data leakage triage: quantitative measure of effectiveness of containment plan.
Int. J. Inf. Comput. Secur., 2015

2013
An offensive containment strategy based on Malware's attack patterns.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

2012
An agent-based model to simulate coordinated response to malware outbreak within an organisation.
Int. J. Inf. Comput. Secur., 2012


  Loading...