Yaokai Feng

Orcid: 0000-0001-6074-2514

According to our database1, Yaokai Feng authored at least 63 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Efficient Detection Mechanism of Network Intrusions in IoT Environments Using Autoencoder and Data Partitioning.
Comput., October, 2024

A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy.
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024

An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection.
Inf., 2023

A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

2021
Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

Sequential Detection of Cyber-attacks Using a Classification Filter.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.
Sensors, 2020

A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks.
Int. J. Netw. Comput., 2020

2019
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

A Sequential Scheme for Detecting Cyber Attacks in IoT Environment.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Lightweight Classification of IoT Malware Based on Image Recognition.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

C&C session detection using random forest.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Behavior-Based Method for Detecting DNS Amplification Attacks.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Cyberbullying detection using parent-child relationship between comments.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

A Comprehensive Security Analysis Checksheet for OpenFlow Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Selective Concealment of Characters for Privacy Protection.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

A Parameterless Learning Algorithm for Behavior-Based Detection.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets.
J. Inf. Process., 2013

Skew Estimation by Parts.
IEICE Trans. Inf. Syst., 2013

Scene Character Detection and Recognition with Cooperative Multiple-Hypothesis Framework.
IEICE Trans. Inf. Syst., 2013

Part-based methods for handwritten digit recognition.
Frontiers Comput. Sci., 2013

On the Possibility of Structure Learning-Based Scene Character Detector.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Detection and Tracking Protein Molecules in Fluorescence Microscopic Video.
Proceedings of the First International Symposium on Computing and Networking, 2013

Font Distribution Observation by Network-Based Analysis.
Proceedings of the Camera-Based Document Analysis and Recognition, 2013

A Hierarchical Visual Saliency Model for Character Detection in Natural Scenes.
Proceedings of the Camera-Based Document Analysis and Recognition, 2013

2012
A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Non-Markovian dynamic time warping.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Character Image Patterns as Big Data.
Proceedings of the 2012 International Conference on Frontiers in Handwriting Recognition, 2012

On the Possibility of Instance-Based Stroke Recovery.
Proceedings of the 2012 International Conference on Frontiers in Handwriting Recognition, 2012

Analytical Dynamic Programming Matching.
Proceedings of the Computer Vision - ECCV 2012. Workshops and Demonstrations, 2012

A Part-Based Skew Estimation Method.
Proceedings of the 10th IAPR International Workshop on Document Analysis Systems, 2012

2011
Efficient evaluation of partially-dimensional range queries in large OLAP datasets.
Int. J. Data Min. Model. Manag., 2011

Massive character recognition with a large ground-truthed database.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Watching pattern distribution via massive character recognition.
Proceedings of the 2011 IEEE International Workshop on Machine Learning for Signal Processing, 2011

A New Approach for Instance-Based Skew Estimation.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2011

A Keypoint-Based Approach toward Scenery Character Detection.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

A Generative Model for Handwritings Based on Enhanced Feature Desynchronization.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Scenery Character Detection with Environmental Context.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

2010
How to Design Kansei Retrieval Systems?
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Analytical Dynamic Programming Tracker.
Proceedings of the Computer Vision - ACCV 2010, 2010

2007
An Estimating Model of Node Accesses for INN Search Algorithm in Multidimensional Spaces.
Eng. Lett., 2007

A Cost Model for Incremental Nearest Neighbor Search in Multidimensional Spaces.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

2006
A New Structure for Accelerating XPath Location Steps.
Proceedings of the Advances in Web-Age Information Management, 2006

Efficient Evaluation of Partially-Dimensional Range Queries Using Adaptive R*-tree.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Ag-Tree: A Novel Structure for Range Queries in Data Warehouse Environments.
Proceedings of the Database Systems for Advanced Applications, 2006

2005
A Hybrid Clustering Criterion for R*-Tree on Business Data.
Proceedings of the ICEIS 2005, 2005

2004
Improving Query Performance on OLAP-Data Using Enhanced Multidimensional Indices.
Proceedings of the ICEIS 2004, 2004

2002
SOM-Based K-Nearest Neighbors Search in Large Image Databases.
Proceedings of the Visual and Multimedia Information Management, 2002

Clustered R-trees: Improving R-trees for Nearest Neighbor Search.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

2001
SOM-Based R*-tree for Similarity Retrieval.
Proceedings of the Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001, 2001


  Loading...