default search action
Tao Ban
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Akira Yamada, Takeshi Takahashi, Daisuke Inoue:
Securing Code With Context: Enhancing Vulnerability Detection Through Contextualized Graph Representations. IEEE Access 12: 142101-142126 (2024) - 2023
- [j24]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Akira Yamada, Takeshi Takahashi, Sangwook Kim, Daisuke Inoue:
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation. IEEE Access 11: 102727-102745 (2023) - [j23]Kohei Miyamoto, Masazumi Iida, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach. IEEE Access 11: 132792-132810 (2023) - [j22]Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Takeshi Takahashi, Daisuke Inoue:
IoT malware classification based on reinterpreted function-call graphs. Comput. Secur. 125: 103060 (2023) - [c90]Harry Chandra Tanuwidjaja, Takeshi Takahashi, Tsung-Nan Lin, Boyi Lee, Tao Ban:
Hybrid Explainable Intrusion Detection System: Global vs. Local Approach. ARTMAN@CCS 2023: 37-42 - [c89]Shota Kawanaka, Yoshikatsu Kashiwabara, Kohei Miyamoto, Masazumi Iida, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads. AsiaJCIS 2023: 88-94 - [c88]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Machine Learning-Based Security Alert Screening with Focal Loss. IEEE Big Data 2023: 3043-3052 - [c87]Jiaxing Zhou, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi, Daisuke Inoue:
Color-coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families. ISCC 2023: 1410-1416 - 2022
- [j21]Ryosuke Ishibashi, Kohei Miyamoto, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems. IEEE Access 10: 53972-53986 (2022) - [j20]Bo Sun, Takeshi Takahashi, Tao Ban, Daisuke Inoue:
Detecting Android Malware and Classifying Its Families in Large-scale Datasets. ACM Trans. Manag. Inf. Syst. 13(2): 12:1-12:21 (2022) - [c86]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks. AsiaJCIS 2022: 1-7 - [c85]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Critical-Threat-Alert Detection using Online Machine Learning. IEEE Big Data 2022: 3007-3014 - [c84]Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi:
IoT Botnet Detection Based on the Behaviors of DNS Queries. DSC 2022: 1-7 - [c83]Kohei Miyamoto, Hiroki Goto, Ryosuke Ishibashi, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Malicious Packet Classification Based on Neural Network Using Kitsune Features. ISPR 2022: 306-314 - 2021
- [j19]Bo Sun, Tao Ban, Chansu Han, Takeshi Takahashi, Katsunari Yoshioka, Jun'ichi Takeuchi, Abdolhossein Sarrafzadeh, Meikang Qiu, Daisuke Inoue:
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks. IEEE Access 9: 87962-87971 (2021) - [c82]Ryosuke Ishibashi, Hiroki Goto, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions. AsiaJCIS 2021: 9-16 - [c81]Samuel Ndichu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs. IEEE BigData 2021: 2119-2127 - [c80]Kohei Masumi, Chansu Han, Tao Ban, Takeshi Takahashi:
Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort. CODASPY 2021: 329-331 - [c79]Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Sangwook Kim, Takeshi Takahashi, Daisuke Inoue:
JStrack: Enriching Malicious JavaScript Detection Based on AST Graph Analysis and Attention Mechanism. ICONIP (2) 2021: 669-680 - [c78]Takeshi Takahashi, Yuki Umemura, Chansu Han, Tao Ban, Keisuke Furumoto, Ohnori Nakamura, Katsunari Yoshioka, Jun'ichi Takeuchi, Noboru Murata, Yoshiaki Shiraishi:
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines? PerCom Workshops 2021: 376-379 - [c77]Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Bo Sun, Takeshi Takahashi:
IoT Malware Detection Using Function-Call-Graph Embedding. PST 2021: 1-9 - [c76]Masaki Aota, Tao Ban, Takeshi Takahashi, Noboru Murata:
Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization. TrustCom 2021: 988-996 - [c75]Akira Fujita, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
On-premises Analysis of Advanced Threat Prevention Appliances. CSET @ USENIX Security Symposium 2021: 1-8 - [c74]Tao Ban, Samuel Ndichu, Takeshi Takahashi, Daisuke Inoue:
Combat Security Alert Fatigue with AI-Assisted Techniques. CSET @ USENIX Security Symposium 2021: 9-16 - 2020
- [j18]Muhamad Erza Aminanto, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis. IEEE Access 8: 217977-217986 (2020) - [j17]Seiichi Ozawa, Tao Ban, Naoki Hashimoto, Junji Nakazato, Jumpei Shimamura:
A study of IoT malware activities using association rule learning for darknet sensor data. Int. J. Inf. Sec. 19(1): 83-92 (2020) - [j16]Tzu-Ling Wan, Tao Ban, Shin-Ming Cheng, Yen-Ting Lee, Bo Sun, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files. IEEE Open J. Comput. Soc. 1: 262-275 (2020) - [c73]Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Bo Sun, Tao Ban, Takeshi Takahashi, Ting-Wei Wu, Shang-Wei Kao:
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing. AsiaJCIS 2020: 128-136 - [c72]Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
IoT-Malware Detection Based on Byte Sequences of Executable Files. AsiaJCIS 2020: 143-150 - [c71]Shaoning Pang, Tao Ban, Youki Kadobayashi, Jungsuk Song, Kaizhu Huang, Geongsen Poh, Iqbal Gondal, Kitsuchart Pasupa, Fadi A. Aloul:
CDMC'19 - The 10th International Cybersecurity Data Mining Competition. ICONIP (2) 2020: 235-245 - [c70]Shintaro Ishikawa, Seiichi Ozawa, Tao Ban:
Port-Piece Embedding for Darknet Traffic Features and Clustering of Scan Attacks. ICONIP (2) 2020: 593-603 - [c69]Shin-Ming Cheng, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue:
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures. SP (Workshops) 2020: 126 - [c68]Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. TrustCom 2020: 775-784 - [c67]Shin-Ying Huang, Tao Ban:
Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis. TrustCom 2020: 1771-1776
2010 – 2019
- 2019
- [j15]Tao Ban, Ryoichi Isawa, Shin-Ying Huang, Katsunari Yoshioka, Daisuke Inoue:
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices. IEICE Trans. Inf. Syst. 102-D(9): 1683-1685 (2019) - [c66]Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao:
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices. AsiaJCIS 2019: 9-15 - [c65]Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban:
Malicious URL Linkage Analysis and Common Pattern Discovery. IEEE BigData 2019: 3172-3179 - [c64]Ryutaro Ushigome, Mio Suzuki, Tao Ban, Takeshi Takahashi, Daisuke Inoue, Takeshi Matsuda, Michio Sonoda:
Establishing Trusted and Timely Information Source using Social Media Services. CCNC 2019: 1-2 - [c63]Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest. ICONIP (1) 2019: 756-765 - [c62]Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest. PST 2019: 1-3 - [c61]Bo Sun, Tao Ban, Shun-Chieh Chang, Yeali S. Sun, Takeshi Takahashi, Daisuke Inoue:
A scalable and accurate feature representation method for identifying malicious mobile applications. SAC 2019: 1182-1189 - [c60]Shin-Ying Huang, Tao Ban:
A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration. TrustCom/BigDataSE 2019: 208-215 - [c59]Guanbo Jia, Paul Miller, Xin Hong, Harsha K. Kalutarage, Tao Ban:
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder. TrustCom/BigDataSE 2019: 458-465 - 2018
- [j14]Igor Skrjanc, Seiichi Ozawa, Tao Ban, Dejan Dovzan:
Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering. Appl. Soft Comput. 62: 592-601 (2018) - [j13]Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Automatically Generating Malware Analysis Reports Using Sandbox Logs. IEICE Trans. Inf. Syst. 101-D(11): 2622-2632 (2018) - [j12]Lei Zhu, Kazushi Ikeda, Shaoning Pang, Tao Ban, Abdolhossein Sarrafzadeh:
Merging weighted SVMs for parallel incremental learning. Neural Networks 100: 25-38 (2018) - [c58]Ryoichi Isawa, Tao Ban, Ying Tie, Katsunari Yoshioka, Daisuke Inoue:
Evaluating Disassembly-Code Based Similarity between IoT Malware Samples. AsiaJCIS 2018: 89-94 - [c57]Tao Ban, Ryoichi Isawa, Katsunari Yoshioka, Daisuke Inoue:
A Cross-Platform Study on IoT Malware. ICMU 2018: 1-2 - [c56]Lei Zhu, Tao Ban, Takeshi Takahashi, Daisuke Inoue:
Employ Decision Values for Soft-Classifier Evaluation with Crispy References. ICONIP (4) 2018: 392-402 - [c55]Shaoning Pang, Lei Zhu, Tao Ban, Kazushi Ikeda, Wangfei Zhang, Abdolhossein Sarrafzadeh, Takeshi Takahashi, Daisuke Inoue:
Online Max-flow Learning via Augmenting and De-augmenting Path. IJCNN 2018: 1-8 - [c54]Naoki Hashimoto, Seiichi Ozawa, Tao Ban, Junji Nakazato, Jumpei Shimamura:
A Darknet Traffic Analysis for IoT Malwares Using Association Rule Learning. INNS Conference on Big Data 2018: 118-123 - [c53]Shin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban:
Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage Analysis. PST 2018: 1-2 - 2017
- [j11]Shaoning Pang, Dan Komosny, Lei Zhu, Ruibin Zhang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis. Wirel. Pers. Commun. 96(4): 5335-5353 (2017) - [c52]Tao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao:
Detection of Botnet Activities Through the Lens of a Large-Scale Darknet. ICONIP (5) 2017: 442-451 - [c51]Junjie Tang, Xingmin Cui, Ziming Zhao, Shanqing Guo, Xin-Shun Xu, Chengyu Hu, Tao Ban, Bing Mao:
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps. ICST 2017: 492-499 - [c50]Igor Skrjanc, Seiichi Ozawa, Dejan Dovzan, Tao Ban, Junji Nakazato, Jumpei Shimamura:
Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring. SSCI 2017: 1-7 - [c49]Tao Ban, Daisuke Inoue:
Practical darknet traffic analysis: Methods and case studies. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [c48]Takahiro Konno, Runhe Huang, Tao Ban, Chuanhe Huang:
Goods recommendation based on retail knowledge in a Neo4j graph database combined with an inference mechanism implemented in jess. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - 2016
- [j10]Lei Zhu, Shaoning Pang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Incremental and Decremental Max-Flow for Online Semi-Supervised Learning. IEEE Trans. Knowl. Data Eng. 28(8): 2115-2127 (2016) - [c47]Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM. AsiaJCIS 2016: 141-146 - [c46]Takeshi Takahashi, Tao Ban, Chin-Wei Tien, Chih-Hung Lin, Daisuke Inoue, Koji Nakao:
The Usability of Metadata for Android Application Analysis. ICONIP (1) 2016: 546-554 - [c45]Siti Hajar Aminah Ali, Seiichi Ozawa, Tao Ban, Junji Nakazato, Jumpei Shimamura:
A neural network model for detecting DDoS attacks using darknet traffic features. IJCNN 2016: 2979-2985 - [c44]Tao Ban, Daisuke Inoue:
Feature subset selection by SVM ensemble. SSCI 2016: 1-8 - [c43]Lei Zhu, Tao Ban, Kazushi Ikeda, Paul Pang, Abdolhossein Sarrafzadeh:
Distributed incremental wLPSVM learning. SSCI 2016: 1-8 - [c42]Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao, Runhe Huang:
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 341-349 - 2015
- [j9]Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo, Lizhen Cui:
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications. Secur. Commun. Networks 8(13): 2338-2349 (2015) - [c41]Nobuaki Furutani, Jun Kitazono, Seiichi Ozawa, Tao Ban, Junji Nakazato, Jumpei Shimamura:
Adaptive DDoS-Event Detection from Big Darknet Traffic Data. ICONIP (4) 2015: 376-383 - [c40]Kai Ma, Mengyang Liu, Shanqing Guo, Tao Ban:
MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications. ICONIP (3) 2015: 384-391 - [c39]Takeshi Takahashi, Tao Ban, Takao Mimura, Koji Nakao:
Fine-Grained Risk Level Quantication Schemes Based on APK Metadata. ICONIP (3) 2015: 663-673 - [c38]Siti Hajar Aminah Ali, Seiichi Ozawa, Junji Nakazato, Tao Ban, Jumpei Shimamura:
An autonomous online malicious spam email detection system using extended RBF network. IJCNN 2015: 1-7 - [c37]Tao Ban, Masashi Eto, Shanqing Guo, Daisuke Inoue, Koji Nakao, Runhe Huang:
A study on association rule mining of darknet big data. IJCNN 2015: 1-7 - [c36]Shaoning Pang, Yiming Peng, Tao Ban, Daisuke Inoue, Abdolhossein Sarrafzadeh:
A federated network online network traffics analysis engine for cybersecurity. IJCNN 2015: 1-8 - [c35]Hironori Nishikaze, Seiichi Ozawa, Jun Kitazono, Tao Ban, Junji Nakazato, Jumpei Shimamura:
Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features. INNS Conference on Big Data 2015: 175-182 - 2014
- [j8]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
A Learner-Independent Knowledge Transfer Approach to Multi-task Learning. Cogn. Comput. 6(3): 304-320 (2014) - [j7]Ryoichi Isawa, Tao Ban, Shanqing Guo, Daisuke Inoue, Koji Nakao:
An Accurate Packer Identification Method Using Support Vector Machine. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 253-263 (2014) - [c34]Nobuaki Furutani, Tao Ban, Junji Nakazato, Jumpei Shimamura, Jun Kitazono, Seiichi Ozawa:
Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets. AsiaJCIS 2014: 39-43 - [c33]Yuli Dai, Shunsuke Tada, Tao Ban, Junji Nakazato, Jumpei Shimamura, Seiichi Ozawa:
Detecting Malicious Spam Mails: An Online Machine Learning Approach. ICONIP (3) 2014: 365-372 - 2013
- [j6]Shaoning Pang, Lei Zhu, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Dynamic class imbalance learning for incremental LPSVM. Neural Networks 44: 87-100 (2013) - [c32]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel. AsiaJCIS 2013: 69-76 - [c31]Lei Song, Shaoning Pang, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
An incremental learning approach to continuous image change detection. FSKD 2013: 747-752 - [c30]Tao Ban, Ruibin Zhang, Shaoning Pang, Abdolhossein Sarrafzadeh, Daisuke Inoue:
Referential kNN Regression for Financial Time Series Forecasting. ICONIP (1) 2013: 601-608 - [c29]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Application of string kernel based support vector machine for malware packer identification. IJCNN 2013: 1-8 - [c28]Yiming Peng, Shaoning Pang, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
Chunk incremental IDR/QR LDA learning. IJCNN 2013: 1-8 - [c27]Jingwei Wang, Neil Y. Yen, Bin Guo, Runhe Huang, Jianhua Ma, Tao Ban, Hong Zhao:
User Travelling Pattern Prediction via Indistinct Cellular Data Mining. UIC/ATC 2013: 17-24 - 2012
- [j5]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Towards Cost-Effective P2P Traffic Classification in Cloud Environment. IEICE Trans. Inf. Syst. 95-D(12): 2888-2897 (2012) - [j4]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
LDA Merging and Splitting With Applications to Multiagent Cooperative Learning and System Alteration. IEEE Trans. Syst. Man Cybern. Part B 42(2): 552-564 (2012) - [c26]Shanqing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, Tao Ban:
A Fine-Grained Classification Approach for the Packed Malicious Code. ICICS 2012: 497-504 - [c25]Xiaoyan Yan, Bo Liang, Tao Ban, Shanqing Guo, Liming Wang:
TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality. ICONIP (4) 2012: 100-107 - [c24]Gang Chen, Shaoning Pang, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue:
SDE-Driven Service Provision Control. ICONIP (1) 2012: 260-268 - [c23]Shaoning Pang, Fan Liu, Youki Kadobayashi, Tao Ban, Daisuke Inoue:
Training Minimum Enclosing Balls for Cross Tasks Knowledge Transfer. ICONIP (1) 2012: 375-382 - [c22]Tao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao:
Behavior Analysis of Long-term Cyber Attacks in the Darknet. ICONIP (5) 2012: 620-628 - [c21]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
A study on cost-effective P2P traffic classification. IJCNN 2012: 1-7 - 2011
- [j3]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Personalized mode transductive spanning SVM classification tree. Inf. Sci. 181(11): 2071-2085 (2011) - [c20]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Entropy Based Discriminators for P2P Teletraffic Characterization. ICONIP (2) 2011: 18-27 - [c19]Liangxiong Li, Fengyu Wang, Tao Ban, Shanqing Guo, Bin Gong:
Network Flow Classification Based on the Rhythm of Packets. ICONIP (2) 2011: 45-52 - [c18]Tao Ban, Shanqing Guo, Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Practical network traffic analysis in P2P environment. IWCMC 2011: 1801-1807 - [c17]Tao Ban, Changshui Zhang, Shigeo Abe, Takeshi Takahashi, Youki Kadobayashi:
Mining interlacing manifolds in high dimensional spaces. SAC 2011: 942-949 - 2010
- [c16]Yongquan Shi, Tao Ban, Shanqing Guo, Qiuliang Xu, Youki Kadobayashi:
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing. ICONIP (2) 2010: 143-151 - [c15]Shanqing Guo, Qixia Yuan, Fengbo Lin, Fengyu Wang, Tao Ban:
A Malware Detection Algorithm Based on Multi-view Fusion. ICONIP (2) 2010: 259-266 - [c14]Tao Ban, Ruo Ando, Youki Kadobayashi:
A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis. ICONIP (2) 2010: 267-274 - [c13]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Incremental and decremental LDA learning with applications. IJCNN 2010: 1-8
2000 – 2009
- 2009
- [j2]Tao Ban, Changshui Zhang, Shigeo Abe:
A new approach to discover interlacing data structures in high-dimensional space. J. Intell. Inf. Syst. 33(1): 3-22 (2009) - [j1]Shaoning Pang, Tao Ban:
Guest editorial: Thematic issue on 'Adaptive Soft Computing Techniques and Applications'. Memetic Comput. 1(4): 239-240 (2009) - [c12]Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola K. Kasabov:
Spanning SVM Tree for Personalized Transductive Learning. ICANN (1) 2009: 913-922 - [c11]Ye Chen, Shaoning Pang, Nikola K. Kasabov, Tao Ban, Youki Kadobayashi:
Hierarchical Core Vector Machines for Network Intrusion Detection. ICONIP (2) 2009: 520-529 - [c10]Zbynek Michlovský, Shaoning Pang, Nikola K. Kasabov, Tao Ban, Youki Kadobayashi:
String Kernel Based SVM for Internet Security Implementation. ICONIP (2) 2009: 530-539 - [c9]Tao Ban, Shanqing Guo, Qiuliang Xu, Youki Kadobayashi:
AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces. ICONIP (2) 2009: 729-737 - [c8]Mengbo Hou, Qiuliang Xu, Tao Ban:
Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. IIH-MSP 2009: 644-647 - [c7]Xiangfei Sun, Qiuliang Xu, Tao Ban:
Identity Based Authenticated Key Agreement for Tree-Based Group. IIH-MSP 2009: 941-944 - [c6]Hao Wang, Qiuliang Xu, Tao Ban:
A Provably Secure Two-Party Attribute-Based Key Agreement Protocol. IIH-MSP 2009: 1042-1045 - [c5]Tao Ban, Youki Kadobayashi, Shigeo Abe:
Sparse kernel feature analysis using FastMap and its variants. IJCNN 2009: 256-263 - 2008
- [c4]Zhonghua Zhao, Shanqing Guo, Qiuliang Xu, Tao Ban:
G-Means: A Clustering Algorithm for Intrusion Detection. ICONIP (1) 2008: 563-570 - [c3]Yan Yu, Shanqing Guo, Shaohua Lan, Tao Ban:
Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning. ICONIP (1) 2008: 571-578 - 2007
- [c2]Tao Ban:
Using Genetic Algorithm to Balance the D-Index Algorithm for Metric Search. ICONIP (2) 2007: 264-273 - 2006
- [c1]Tao Ban, Shigeo Abe:
Implementing Multi-class Classifiers by One-class Classification Methods. IJCNN 2006: 327-332
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint