Ming-Yang Su
According to our database1,
Ming-Yang Su
authored at least 49 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Multim. Syst., October, 2024
TEPM: traveller enrolment prediction mechanism using BERT-based feature clustering and LSTM models.
Int. J. Ad Hoc Ubiquitous Comput., 2024
2023
Applying Super Resolution and Optical Flow to Implement a Roll Call System for a Small Classroom by Webcam.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
2019
Android Malware Detection Approaches in Combination with Static and Dynamic Features.
Int. J. Netw. Secur., 2019
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
Comput. Electr. Eng., 2017
Machine learning on merging static and dynamic features to identify malicious mobile apps.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
2016
Proceedings of the International Conference on High Performance Computing & Simulation, 2016
Detection of android malware by static analysis on permissions and sensitive functions.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016
2015
J. Networks, 2015
Int. J. Commun. Syst., 2015
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
2014
Proceedings of the International Conference on Information Networking 2014, 2014
2013
J. Netw. Comput. Appl., 2013
2012
A study on the data privacy and operation performance for cloud collaborative editing systems.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
Secur. Commun. Networks, 2011
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification.
J. Netw. Comput. Appl., 2011
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks.
Int. J. Ad Hoc Ubiquitous Comput., 2011
Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers.
Expert Syst. Appl., 2011
A novel intrusion detection system based on hierarchical clustering and support vector machines.
Expert Syst. Appl., 2011
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems.
Comput. Commun., 2011
Proceedings of the FUZZ-IEEE 2011, 2011
The Research of Locating Methods for Mobile Stations Based on IEEE 802.16e Multi-hop WMANs.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Discovery and prevention of attack episodes by frequent episodes mining and finite state machines.
J. Netw. Comput. Appl., 2010
An online response system for anomaly traffic by incremental mining with genetic optimization.
J. Commun. Networks, 2010
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks.
Comput. Secur., 2010
Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes.
Proceedings of the Wireless Algorithms, 2010
Using Genetic Algorithm to Improve an Online Response System for Anomaly Traffic by Incremental Mining.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010
2009
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach.
Comput. Secur., 2009
Comput. Commun., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
2008
Anomaly detection for web server based on smooth support vector machine.
Comput. Syst. Sci. Eng., 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN.
Proceedings of the Intelligence and Security Informatics, 2008
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
2005
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005
2001
Parallel Comput., 2001
2000
1999
J. Parallel Distributed Comput., 1999
1998
Proceedings of the International Conference on Parallel and Distributed Systems, 1998
1997
IEEE Trans. Parallel Distributed Syst., 1997
1996
A linear-time algorithm for computing the diameters of the incomplete WK-recursive networks.
Proceedings of the 1996 International Conference on Parallel and Distributed Systems (ICPADS '96), 1996
1994