Te-En Wei

According to our database1, Te-En Wei authored at least 21 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Explainable Malware Detection Using Predefined Network Flow.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2019
WebHound: a data-driven intrusion detection from real-world web access logs.
Soft Comput., 2019

Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Graph Edit Distance.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2016
ChainSpot: Mining Service Logs for Cyber Security Threat Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

Smartphone continuous authentication based on keystroke and gesture profiling.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
Detecting Spam on Twitter via Message-Passing Based on Retweet-Relation.
Proceedings of the Technologies and Applications of Artificial Intelligence, 2014

2013
DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2013

Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Android Malware Detection via a Latent Network Behavior Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3<sup>rd</sup> Party Human Attack.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Android privacy.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

A novel approach for re-authentication protocol using personalized information.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

DroidMat: Android Malware Detection through Manifest and API Calls Tracing.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
RePEF - A system for Restoring Packed Executable File for malware analysis.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

How to solve collision and authentication issues using RFID protocol technology.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

2010
The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010


  Loading...