Crowdsourcing cybersecurity: Cyber attack detection using social media RP Khandpur, T Ji, S Jan, G Wang, CT Lu, N Ramakrishnan Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017 | 195 | 2017 |
Needle in a haystack: Tracking down elite phishing domains in the wild K Tian, STK Jan, H Hu, D Yao, G Wang Proceedings of the Internet Measurement Conference 2018, 429-442, 2018 | 159 | 2018 |
The next domino to fall: Empirical analysis of user passwords across online services C Wang, STK Jan, H Hu, D Bossart, G Wang Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 96 | 2018 |
Connecting the digital and physical world: Improving the robustness of adversarial attacks STK Jan, J Messou, YC Lin, JB Huang, G Wang Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 962-969, 2019 | 87 | 2019 |
Throwing darts in the dark? detecting bots with limited data using neural data augmentation STK Jan, Q Hao, T Hu, J Pu, S Oswal, G Wang, B Viswanath 2020 IEEE symposium on security and privacy (SP), 1190-1206, 2020 | 81 | 2020 |
It's not what it looks like: Manipulating perceptual hashing based applications Q Hao, L Luo, STK Jan, G Wang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 42 | 2021 |
AI trust in business processes: the need for process-aware explanations STK Jan, V Ishakian, V Muthusamy Proceedings of the AAAI Conference on Artificial Intelligence 34 (08), 13403 …, 2020 | 33 | 2020 |
Assessing browser-level defense against {IDN-based} phishing H Hu, STK Jan, Y Wang, G Wang 30th USENIX Security Symposium (USENIX Security 21), 3739-3756, 2021 | 32 | 2021 |
Pay-per-question: towards targeted Q&A with payments STK Jan, C Wang, Q Zhang, G Wang Proceedings of the 2018 ACM International Conference on Supporting Group …, 2018 | 23 | 2018 |
A simple methodology for soft cost-sensitive classification TK Jan, DW Wang, CH Lin, HT Lin Proceedings of the 18th ACM SIGKDD international conference on Knowledge …, 2012 | 22 | 2012 |
Towards monetary incentives in social Q&A services STK Jan, C Wang, Q Zhang, G Wang arXiv preprint arXiv:1703.01333, 2017 | 10 | 2017 |
Empirical analysis of password reuse and modification across online service C Wang, STK Jan, H Hu, G Wang arXiv preprint arXiv:1706.01939, 2017 | 8 | 2017 |
MeiKe: Influence-based Communities in Networks Y Zhang, B Adhikari, STK Jan, BA Prakash Proceedings of the 2017 SIAM International Conference on Data Mining, 318-326, 2017 | 7 | 2017 |
Cost-sensitive classification on pathogen species of bacterial meningitis by Surface Enhanced Raman Scattering TK Jan, HT Lin, HP Chen, TC Chern, CY Huang, BC Wen, CW Chung, ... 2011 IEEE International Conference on Bioinformatics and Biomedicine, 390-393, 2011 | 6 | 2011 |
Analyzing Payment-Driven Targeted Q8A Systems STK Jan, C Wang, Q Zhang, G Wang ACM Transactions on Social Computing 1 (3), 1-21, 2018 | 4 | 2018 |
Analyzing payment based question and answering service STK Jan, C Wang, Q Zhang, G Wang CoRR (2017), 2017 | 3 | 2017 |
Unstable communities in network ensembles A Rahman, STK Jan, H Kim, BA Prakash, TM Murali Proceedings of the 2016 SIAM International Conference on Data Mining, 504-512, 2016 | 3 | 2016 |
Data selection techniques for large-scale rank SVM KY Lin, TK Jan, HT Lin 2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013 | 3 | 2013 |
A comparison of methods for cost-sensitive support vector machines TK Jan Master's thesis, National Taiwan University, 2010 | 2 | 2010 |
Causal reasoning for explanation of model predictions V Isahagian, V Muthusamy, S Jan US Patent 11,568,281, 2023 | 1 | 2023 |