Tao Ban
Orcid: 0000-0002-9616-3212
According to our database1,
Tao Ban
authored at least 116 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Securing Code With Context: Enhancing Vulnerability Detection Through Contextualized Graph Representations.
IEEE Access, 2024
2023
Comput. Secur., 2023
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation.
IEEE Access, 2023
Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach.
IEEE Access, 2023
Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023
2022
ACM Trans. Manag. Inf. Syst., 2022
Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems.
IEEE Access, 2022
Proceedings of the Intelligent Systems and Pattern Recognition, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism.
Proceedings of the Neural Information Processing - 28th International Conference, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020
A study of IoT malware activities using association rule learning for darknet sensor data.
Int. J. Inf. Sec., 2020
DTRAP, 2020
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the Neural Information Processing - 27th International Conference, 2020
Proceedings of the Neural Information Processing - 27th International Conference, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
IEICE Trans. Inf. Syst., 2019
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A scalable and accurate feature representation method for identifying malicious mobile applications.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
IEICE Trans. Inf. Syst., 2018
Appl. Soft Comput., 2018
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the INNS Conference on Big Data and Deep Learning 2018, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the Neural Information Processing - 25th International Conference, 2018
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2017
Wirel. Pers. Commun., 2017
Goods recommendation based on retail knowledge in a Neo4j graph database combined with an inference mechanism implemented in jess.
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016
Proceedings of the Neural Information Processing - 23rd International Conference, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications.
Secur. Commun. Networks, 2015
Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features.
Proceedings of the INNS Conference on Big Data 2015, 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
An autonomous online malicious spam email detection system using extended RBF network.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
Proceedings of the Neural Information Processing - 22nd International Conference, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Cogn. Comput., 2014
Proceedings of the Neural Information Processing - 21st International Conference, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013
Proceedings of the Neural Information Processing - 20th International Conference, 2013
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration.
IEEE Trans. Syst. Man Cybern. Part B, 2012
IEICE Trans. Inf. Syst., 2012
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012
TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
2010
Proceedings of the International Joint Conference on Neural Networks, 2010
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing.
Proceedings of the Neural Information Processing. Models and Applications, 2010
Proceedings of the Neural Information Processing. Models and Applications, 2010
A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis.
Proceedings of the Neural Information Processing. Models and Applications, 2010
2009
Guest editorial: Thematic issue on 'Adaptive Soft Computing Techniques and Applications'.
Memetic Comput., 2009
J. Intell. Inf. Syst., 2009
Proceedings of the International Joint Conference on Neural Networks, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the Artificial Neural Networks, 2009
2008
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
2007
Proceedings of the Neural Information Processing, 14th International Conference, 2007
2006
Proceedings of the International Joint Conference on Neural Networks, 2006