Referential kNN Regression for Financial Time Series Forecasting T Ban, R Zhang, S Pang, A Sarrafzadeh, D Inoue Neural Information Processing: 20th International Conference, ICONIP 2013 …, 2013 | 72 | 2013 |
Implementing multi-class classifiers by one-class classification methods T Ban, S Abe The 2006 IEEE International Joint Conference on Neural Network Proceedings …, 2006 | 67 | 2006 |
A privacy-preserving federated learning system for android malware detection based on edge computing RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020 | 62 | 2020 |
Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering I Škrjanc, S Ozawa, T Ban, D Dovžan Applied Soft Computing 62, 592-601, 2018 | 52 | 2018 |
Machine learning framework to analyze iot malware using elf and opcode features CW Tien, SW Chen, T Ban, SY Kuo Digital Threats: Research and Practice 1 (1), 1-19, 2020 | 41 | 2020 |
Personalized mode transductive spanning SVM classification tree S Pang, T Ban, Y Kadobayashi, N Kasabov Information Sciences 181 (11), 2071-2085, 2011 | 41 | 2011 |
A provably secure two-party attribute-based key agreement protocol H Wang, Q Xu, T Ban 2009 fifth international conference on intelligent information hiding and …, 2009 | 41 | 2009 |
Combat security alert fatigue with ai-assisted techniques T Ban, N Samuel, T Takahashi, D Inoue Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 9-16, 2021 | 40 | 2021 |
Threat alert prioritization using isolation forest and stacked auto encoder with day-forward-chaining analysis ME Aminanto, T Ban, R Isawa, T Takahashi, D Inoue IEEE Access 8, 217977-217986, 2020 | 40 | 2020 |
A study on association rule mining of darknet big data T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang 2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015 | 39 | 2015 |
A study of IoT malware activities using association rule learning for darknet sensor data S Ozawa, T Ban, N Hashimoto, J Nakazato, J Shimamura International Journal of Information Security 19, 83-92, 2020 | 35 | 2020 |
A neural network model for detecting DDoS attacks using darknet traffic features SHA Ali, S Ozawa, T Ban, J Nakazato, J Shimamura 2016 International joint conference on neural networks (IJCNN), 2979-2985, 2016 | 33 | 2016 |
Integration of multi-modal features for android malware detection using linear SVM T Ban, T Takahashi, S Guo, D Inoue, K Nakao 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016 | 31 | 2016 |
Cross platform IoT-malware family classification based on printable strings YT Lee, T Ban, TL Wan, SM Cheng, R Isawa, T Takahashi, D Inoue 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 30 | 2020 |
Detection of DDoS backscatter based on traffic features of darknet TCP packets N Furutani, T Ban, J Nakazato, J Shimamura, J Kitazono, S Ozawa 2014 Ninth Asia Joint conference on information security, 39-43, 2014 | 30 | 2014 |
Dynamic class imbalance learning for incremental LPSVM S Pang, L Zhu, G Chen, A Sarrafzadeh, T Ban, D Inoue Neural Networks 44, 87-100, 2013 | 30 | 2013 |
Spatially chunking support vector clustering algorithm T Ban, S Abe 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No …, 2004 | 30 | 2004 |
Efficient detection and classification of internet-of-things malware based on byte sequences from executable files TL Wan, T Ban, SM Cheng, YT Lee, B Sun, R Isawa, T Takahashi, D Inoue IEEE Open Journal of the Computer Society 1, 262-275, 2020 | 27 | 2020 |
G-means: a clustering algorithm for intrusion detection Z Zhao, S Guo, Q Xu, T Ban International Conference on Neural Information Processing, 563-570, 2008 | 25 | 2008 |
Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines? T Takahashi, Y Umemura, C Han, T Ban, K Furumoto, O Nakamura, ... 2021 IEEE International Conference on Pervasive Computing and Communications …, 2021 | 23 | 2021 |