Shou-Hsuan Stephen Huang

Orcid: 0000-0002-9428-4301

Affiliations:
  • University of Houston, USA


According to our database1, Shou-Hsuan Stephen Huang authored at least 67 papers between 1981 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Illuminating the Black Box: A Psychometric Investigation into the Multifaceted Nature of Large Language Models.
CoRR, 2023

2020
SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Detecting Malicious Users Behind Circuit-Based Anonymity Networks.
IEEE Access, 2020

2019
Detecting Intruders by User File Access Patterns.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Malicious Apps May Explore a Smartphone's Vulnerability to Detect One's Activities.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
A Multi-Objective Flow Cytometry Profiling for B-Cell Lymphoma Diagnosis.
Proceedings of the 7th ACM International Conference on Bioinformatics, 2016

Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Per Connection Server-Side Identification of Connections via Tor.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2013
Detecting stepping-stones under the influence of packet jittering.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
Automatic B cell lymphoma detection using flow cytometry data.
Proceedings of the IEEE 2nd International Conference on Computational Advances in Bio and Medical Sciences, 2012

2011
Packet-based algorithms for stepping-stone detection with chaff perturbation.
Secur. Commun. Networks, 2011

Detecting Chaff Perturbation on Stepping-Stone Connection.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Detecting Intruders Using a Long Connection Chain to Connect to a Host.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Neural networks-based detection of stepping-stone intrusion.
Expert Syst. Appl., 2010

Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Detect multi-hop stepping-stone pairs with clock skew.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
A Multidimensional Flow Cytometry Data Classification.
Proceedings of the Ninth IEEE International Conference on Bioinformatics and Bioengineering, 2009

Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Masquerade Detection Using Command Prediction and Association Rules Mining.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Detecting Stepping-Stone Intruders with Long Connection Chains.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Detecting Stepping-Stone Connection Using Association Rule Mining.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Integrating Direct3D Programming into Computer Science Curriculum.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

User Behavior Analysis in Masquerade Detection Using Principal Component Analysis.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Performance of Neural Networks in Stepping-Stone Intrusion Detection.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Detecting Masqueraders Using High Frequency Commands as Signatures.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Mining TCP/IP packets to detect stepping-stone intrusion.
Comput. Secur., 2007

Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection.
Comput. Secur., 2007

Stepping-stone detection algorithm based on order preserving mapping.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

Stepping-Stone Detection Via Request-Response Traffic Analysis.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Detecting Stepping-Stone with Chaff Perturbations.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A Dynamic Mobility Management Scheme for VoIP Services.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Resistance Analysis to Intruders' Evasion of Detecting Intrusion.
Proceedings of the Information Security, 9th International Conference, 2006

A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Improved Thumbprint and Its Application for Intrusion Detection.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Exploring Similarity among Web Pages Using the Hyperlink Structure.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A real-time algorithm to detect long connection chains of interactive terminal sessions.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Similarity Among Web pages Based on their Link Structure.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'03, June 23, 2003

2002
Multi-User Interactive 3D Presentation System via the Internet.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

R2H: A Framework to Transform Relations into Hypertext.
Proceedings of the International Conference on Internet Computing, 2002

2001
WebLQM : A Web Community Examiner.
Proceedings of the Poster Proceedings of the Tenth International World Wide Web Conference, 2001

1999
An Efficient Parallel EM Algorithm: A Sparse Matrix Compaction Technique.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

An Efficient Sparse Matrix Based Parallel Image Reconstruction Algorithm for PET on SP2.
Proceedings of the 12th IEEE Symposium on Computer-Based Medical Systems (CBMS '99). 18-20 June 1999, 1999

1998
Inter-Iteration Optimization of Parallel EM Algorithm on Message-Passing Multicomputers.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

A Portable PET Image Reconstruction System for Parallel Machines.
Proceedings of the 11th IEEE Symposium on Computer-Based Medical Systems (CBMS '98), 1998

1997
On Embedding Rectangular Meshes into Rectangular Meshes of Smaller Aspect Ratio.
Inf. Process. Lett., 1997

1996
A New Combinatorial Approach to Optimal Embeddings of Rectangles.
Algorithmica, 1996

Edge Embedding of Two-Dimensional Grids in Hypercubes with Dilation Two and Congestion Three.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

1995
Embedding Two-Dimensional Grids into Hypercubes with Dilation 2 and Congestion 5.
Proceedings of the 1995 International Conference on Parallel Processing, 1995

1994
Parallel Dynamic Programming.
IEEE Trans. Parallel Distributed Syst., 1994

1993
On Embeddings of Rectangles into Optimal Squares.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

1992
A Sublinear Parallel Algorithm for Some Dynamic Programming Problems.
Theor. Comput. Sci., 1992

1991
DAVID Universal Books Management System.
Proceedings of the Database Systems for Advanced Applications '91, 1991

1990
On the Construction of Weighted Time-Optimal B-Trees.
BIT, 1990

A Sub-linear Parallel Algorithm for Some Dynamic Programming Problems.
Proceedings of the 1990 International Conference on Parallel Processing, 1990

1988
A VLSI Partition Algorithm.
BIT, 1988

1987
Optimal Multiway Split Trees.
J. Algorithms, 1987

1986
Ordered Priority Queues.
BIT, 1986

1985
Height-Balanced Trees of Order (beta,gamma,delta).
ACM Trans. Database Syst., 1985

Multidimensional extendible hashing for partial-match queries.
Int. J. Parallel Program., 1985

1984
Optimal Binary Split Trees.
J. Algorithms, 1984

Generalized Binary Split Trees.
Acta Informatica, 1984

1983
Binary Search Trees with Limited Rotation.
BIT, 1983

1981
Key Comparison Optimal 2-3 Trees with Maximum Utilization.
SIAM J. Comput., 1981


  Loading...