Dan Lo

According to our database1, Dan Lo authored at least 21 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cyber Security in Blockchain.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Design and Implementation of an ERC-20 Smart Contract on the Ethereum Blockchain.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Scalable Machine Learning Using PySpark.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Improving the Prediction Accuracy with Feature Selection for Ransomware Detection.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Authentic Learning of Machine Learning to Ransomware Detection and Prevention.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Ransomware Classification and Detection With Machine Learning Algorithms.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Improving the Machine Learning Prediction Accuracy with Clustering Discretization.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

2020
Case Study-based Portable Hands-on Labware for Machine Learning in Cybersecurity.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Disinformation Detection using Passive Aggressive Algorithms.
Proceedings of the 2020 ACM Southeast Conference, 2020

Utilizing Computer Vision, Clustering and Neural Networks for Melanoma Categorization.
Proceedings of the 2020 ACM Southeast Conference, 2020

Graphical Representation of Text Semantics.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Protecting Data in Android External Data Storage.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

An Emperical Study on Application of Big Data Analytics to Automate Service Desk Business Process.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2016
Promote Self-efficacy in Learning of Mobile App and Security with real-world Relevant Laboratory (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

A Combination of Active and Passive Video Steganalysis to Fight Sensitive Data Exfiltration through Online Video.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2011
A new curriculum for hardware-based network intrusion detection.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

An online tutoring system with instant responses.
Proceedings of the 49th Annual Southeast Regional Conference, 2011


  Loading...