default search action
Andrew H. Sung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c100]Md. Shohel Rana, Mohammad Nur Nobi, Andrew H. Sung:
DeepDistAL: Deepfake Dataset Distillation using Active Learning. CVPR Workshops 2024: 7723-7730 - [c99]Md. Shohel Rana, Andrew H. Sung:
Advanced Deepfake Detection using Machine Learning Algorithms: A Statistical Analysis and Performance Comparison. ICICT 2024: 75-81 - [e7]Hongxin Hu, Andrew H. Sung, Rakesh M. Verma:
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, IWSPA 2024, Porto, Portugal, 21 June 2024. ACM 2024 [contents] - [i3]Amartya Hatua, Trung T. Nguyen, Andrew H. Sung:
Machine Unlearning using a Multi-GAN based Model. CoRR abs/2407.18467 (2024) - 2023
- [c98]Md. Shohel Rana, Andrew H. Sung:
Deepfake Detection: A Tutorial. IWSPA@CODASPY 2023: 55-56 - [c97]Charan Gudla, Andrew H. Sung:
Host IP Obfuscation and Performance Analysis. ICR 2023: 245-255 - [c96]Trung T. Nguyen, Amartya Hatua, Andrew H. Sung:
How to Detect AI-Generated Texts? UEMCON 2023: 464-471 - [e6]David J. Marchette, Andrew H. Sung, Rakesh M. Verma:
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April 2023. ACM 2023 [contents] - [i2]Boluwatife E. Faremi, Jonathon Stavres, Nuno Oliveira, Zhaoxian Zhou, Andrew H. Sung:
Enhancing Machine Learning Performance with Continuous In-Session Ground Truth Scores: Pilot Study on Objective Skeletal Muscle Pain Intensity Prediction. CoRR abs/2308.00886 (2023) - 2022
- [j23]Md. Shohel Rana, Mohammad Nur Nobi, Beddhu Murali, Andrew H. Sung:
Deepfake Detection: A Systematic Literature Review. IEEE Access 10: 25494-25513 (2022) - [e5]Andrew H. Sung, Rakesh M. Verma, Roland H. C. Yap:
IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022. ACM 2022, ISBN 978-1-4503-9230-3 [contents] - [e4]Simone Santini, Andrew H. Sung:
Proceedings of the 19th International Conference on Signal Processing and Multimedia Applications, SIGMAP 2022, Lisbon, Portugal, July 14-16, 2022. SCITEPRESS 2022, ISBN 978-989-758-591-3 [contents] - 2021
- [e3]Chilukuri K. Mohan, Andrew H. Sung:
IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, Virtual Event, USA, April 28, 2021. ACM 2021, ISBN 978-1-4503-8320-2 [contents] - [e2]Simone Santini, Andrew H. Sung:
Proceedings of the 18th International Conference on Signal Processing and Multimedia Applications, SIGMAP 2021, Online Streaming, July 6-8, 2021. SCITEPRESS 2021, ISBN 978-989-758-525-8 [contents] - 2020
- [j22]Md. Shohel Rana, Andrew H. Sung:
Evaluation of Advanced Ensemble Learning Techniques for Android Malware Detection. Vietnam. J. Comput. Sci. 7(02): 145-159 (2020) - [c95]Md. Shohel Rana, Andrew H. Sung:
DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection. CSCloud/EdgeCom 2020: 70-75
2010 – 2019
- 2019
- [c94]Pujan Paudel, Trung T. Nguyen, Amartya Hatua, Andrew H. Sung:
How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniques. ASONAM 2019: 501-508 - [c93]Pujan Paudel, Amartya Hatua, Trung T. Nguyen, Andrew H. Sung:
User Level Multi-feed Weighted Topic Embeddings for Studying Network Interaction in Twitter. BigData 2019: 80-94 - [c92]Trung T. Nguyen, Amartya Hatua, Andrew H. Sung:
Blockchain Approach to Solve Collective Decision Making Problems for Swarm Robotics. BLOCKCHAIN 2019: 118-125 - [c91]Amartya Hatua, Trung T. Nguyen, Andrew H. Sung:
Goal-Oriented Conversational System Using Transfer Learning and Attention Mechanism. UEMCON 2019: 99-104 - [c90]Trung T. Nguyen, Amartya Hatua, Andrew H. Sung:
Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation Problems. UEMCON 2019: 305-311 - 2018
- [c89]Md. Shohel Rana, Sheikh Shah Mohammad Motiur Rahman, Andrew H. Sung:
Evaluation of Tree Based Machine Learning Classifiers for Android Malware Detection. ICCCI (2) 2018: 377-385 - [c88]Md. Shohel Rana, Charan Gudla, Andrew H. Sung:
Evaluating Machine Learning Models for Android Malware Detection: A Comparison Study. ICNCC 2018: 17-21 - 2017
- [c87]Amartya Hatua, Trung T. Nguyen, Andrew H. Sung:
Information Diffusion on Twitter: Pattern Recognition and Prediction of Volume, Sentiment, and Influence. BDCAT 2017: 157-167 - [c86]José Silva, Bernardete Ribeiro, Andrew H. Sung:
Finding the Critical Sampling of Big Datasets. Conf. Computing Frontiers 2017: 355-360 - 2016
- [c85]Qingzhong Liu, Andrew H. Sung, Bing Zhou, Mengyu Qiao:
Exposing Inpainting Forgery in JPEG Images under Recompression Attacks. ICMLA 2016: 164-169 - [c84]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Merging Permission and API Features for Android Malware Detection. IIAI-AAI 2016: 566-571 - [c83]Andrew H. Sung, Bernardete Ribeiro, Qingzhong Liu:
Sampling and Evaluating the Big Data for Knowledge Discovery. IoTBD 2016: 378-382 - 2015
- [j21]Qingzhong Liu, Andrew H. Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang:
A Method to Detect AAC Audio Forgery. EAI Endorsed Trans. Security Safety 2(6): e1 (2015) - [c82]Mengyu Qiao, Suiyuan Zhang, Andrew H. Sung, Qingzhong Liu:
A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics. COMPSAC 2015: 494-503 - [c81]Bernardete Ribeiro, Andrew H. Sung, Divya Suryakumar, Ram B. Basnet:
The Critical Feature Dimension and Critical Sampling Problems. ICPRAM (1) 2015: 360-366 - [p2]Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Lei Chen:
Exposing Image Tampering with the Same Quantization Matrix. Multimedia Data Mining and Analytics 2015: 327-343 - 2014
- [j20]Ram B. Basnet, Andrew H. Sung:
Learning to Detect Phishing Webpages. J. Internet Serv. Inf. Secur. 4(3): 21-39 (2014) - [c80]Qingzhong Liu, Bernardete Ribeiro, Andrew H. Sung, Divya Suryakumar:
Mining the Big Data: The Critical Feature Dimension Problem. IIAI-AAI 2014: 499-504 - 2013
- [j19]Qingzhong Liu, Peter A. Cooper, Lei Chen, Hyuk Cho, Zhongxue Chen, Mengyu Qiao, Yuting Su, Mingzhen Wei, Andrew H. Sung:
Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation. Appl. Intell. 39(4): 705-726 (2013) - [j18]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
MP3 audio steganalysis. Inf. Sci. 231: 123-134 (2013) - 2012
- [c79]Ram B. Basnet, Andrew H. Sung:
Mining Web to Detect Phishing URLs. ICMLA (1) 2012: 568-573 - [c78]Ram B. Basnet, Andrew H. Sung, Qingzhong Liu:
Feature Selection for Improved Phishing Detection. IEA/AIE 2012: 252-261 - [c77]Qingzhong Liu, Xiaodong Li, Lei Chen, Hyuk Cho, Peter A. Cooper, Zhongxue Chen, Mengyu Qiao, Andrew H. Sung:
Identification of Smartphone-Image Source and Manipulation. IEA/AIE 2012: 262-271 - [c76]Divya Suryakumar, Andrew H. Sung, Qingzhong Liu:
Dependance of critical dimension on learning machines and ranking methods. IRI 2012: 738-739 - [c75]Divya Suryakumar, Andrew H. Sung, Subhasish Mazumdar, Qingzhong Liu:
Model evaluation of datasets using critical dimension model invariants. ISDA 2012: 740-745 - 2011
- [j17]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Neighboring joint density-based JPEG steganalysis. ACM Trans. Intell. Syst. Technol. 2(2): 16:1-16:16 (2011) - [j16]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Derivative-based audio steganalysis. ACM Trans. Multim. Comput. Commun. Appl. 7(3): 18:1-18:19 (2011) - [c74]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu, Bernardete Ribeiro:
Locating Information-hiding in MP3 Audio. ICAART (1) 2011: 504-507 - [c73]Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Xudong Huang:
A JPEG-based statistically invisible steganography. ICIMCS 2011: 78-81 - [c72]Divya Suryakumar, Andrew H. Sung, Qingzhong Liu:
Determine the Critical dimension in data mining (experiments with bioinformatics datasets). ISDA 2011: 481-486 - [c71]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
A Method to Detect JPEG-Based Double Compression. ISNN (2) 2011: 466-476 - 2010
- [j15]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Detection of Double MP3 Compression. Cogn. Comput. 2(4): 291-296 (2010) - [j14]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao, Zhongxue Chen, Bernardete Ribeiro:
An improved approach to steganalysis of JPEG images. Inf. Sci. 180(9): 1643-1655 (2010) - [c70]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Predicting embedding strength in audio steganography. IEEE ICCI 2010: 925-930 - [c69]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Revealing real quality of double compressed MP3 audio. ACM Multimedia 2010: 1011-1014
2000 – 2009
- 2009
- [j13]Qingzhong Liu, Mengyu Qiao, Andrew H. Sung:
Distance metric learning and support vector machines for classification of mass spectrometry proteomics data. Int. J. Knowl. Eng. Soft Data Paradigms 1(3): 216-226 (2009) - [j12]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3): 359-368 (2009) - [c68]Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Mengyu Qiao:
Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning. BIOSIGNALS 2009: 396-401 - [c67]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao, Bernardete Ribeiro:
Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis. ICAART 2009: 226-231 - [c66]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Feature Mining and Intelligent Computing for MP3 Steganalysis. IJCBS 2009: 627-630 - [c65]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Steganalysis of MP3Stego. IJCNN 2009: 2566-2571 - [c64]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Spectrum Steganalysis of WAV Audio Streams. MLDM 2009: 582-593 - [c63]Qingzhong Liu, Andrew H. Sung:
A new approach for JPEG resize and image splicing detection. MiFor@MM 2009: 43-48 - [c62]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Novel stream mining for audio steganalysis. ACM Multimedia 2009: 95-104 - [c61]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Improved detection and evaluation for JPEG steganalysis. ACM Multimedia 2009: 873-876 - 2008
- [j11]Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Mingzhen Wei, Zhongxue Chen, Jianyun Xu:
Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci. 178(1): 21-36 (2008) - [j10]Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Jianyun Xu:
Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognit. 41(1): 56-66 (2008) - [j9]Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung:
SQL infections through RFID. J. Comput. Virol. 4(4): 347-356 (2008) - [c60]Anthonius Sulaiman, Madhu K. Shankarapani, Srinivas Mukkamala, Andrew H. Sung:
RFID malware fragmentation attacks. CTS 2008: 533-539 - [c59]Qingzhong Liu, Mengyu Qiao, Andrew H. Sung:
Distance Metric Learning and Support Vector Machines for Classification of Mass Spectrometry Proteomics Data. ICMLA 2008: 631-636 - [c58]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo. ICMLA 2008: 671-674 - [c57]Bernardete Ribeiro, Armando Vieira, João M. M. Duarte, Catarina Silva, João Carvalho das Neves, Qingzhong Liu, Andrew H. Sung:
Learning Manifolds for Bankruptcy Analysis. ICONIP (1) 2008: 723-730 - [c56]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Detecting information-hiding in WAV audios. ICPR 2008: 1-4 - [c55]Rita Ferreira, Bernardete Ribeiro, Catarina Silva, Qingzhong Liu, Andrew H. Sung:
Building resilient classifiers for LSB matching steganography. IJCNN 2008: 1562-1567 - [c54]Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Rita Ferreira:
Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. IJCNN 2008: 3352-3357 - [c53]Ashwin Tamilarasan, Madhu K. Shankarapani, Xiao Qin, Srinivas Mukkamala, Andrew H. Sung:
Integrating energy efficiency and security for storage systems. SMC 2008: 2396-2400 - [p1]Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung:
Detection of Phishing Attacks: A Machine Learning Approach. Soft Computing Applications in Industry 2008: 373-383 - 2007
- [j8]Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Behaviour Mining for Fraud Detection. J. Res. Pract. Inf. Technol. 39(1): 3-18 (2007) - [j7]Jianyun Xu, Andrew H. Sung, Srinivas Mukkamala, Qingzhong Liu:
Obfuscated Malicious Executable Scanner. J. Res. Pract. Inf. Technol. 39(3): 181-198 (2007) - [j6]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham:
Hybrid multi-agent framework for detection of stealthy probes. Appl. Soft Comput. 7(3): 631-641 (2007) - [j5]Mingzhen Wei, Baojun Bai, Andrew H. Sung, Qingzhong Liu, Jiachun Wang, Martha E. Cather:
Predicting injection profiles using ANFIS. Inf. Sci. 177(20): 4445-4461 (2007) - [c52]Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Basnet, Andrew H. Sung:
Detecting Coordinated Distributed Multiple Attacks. AINA Workshops (1) 2007: 557-562 - [c51]Catarina Silva, Bernardete Ribeiro, Andrew H. Sung:
Boosting RVM Classifiers for Large Data Sets. ICANNGA (2) 2007: 228-237 - [c50]Rajani Goteti, Ashwin Tamilarasan, R. S. Balch, Srinivas Mukkamala, Andrew H. Sung:
Estimating Monthly Production of Oil Wells. IFSA (2) 2007: 393-403 - [c49]Ram B. Basnet, Krishna Yendrapalli, Tenzin Doleck, Srinivas Mukkamala, Andrew H. Sung:
Knowledge Based Discovery of Phishing Attacks. IICAI 2007: 731-742 - [c48]Qingzhong Liu, Andrew H. Sung:
Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images. IJCAI 2007: 2808-2813 - [c47]Krishna Yendrapalli, Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung:
Gene Selection for Tumor Classification Using Microarray Gene Expression Data. World Congress on Engineering 2007: 290-295 - [c46]Krishna Yendrapalli, Srinivas Mukkamala, Andrew H. Sung, Bernardete Ribeiro:
Biased Support Vector Machines and Kernel Methods for Intrusion Detection. World Congress on Engineering 2007: 321-325 - [e1]Mislav Grgic, Andrew H. Sung, Guoyin Wang:
International Conference on High Performance Computing, Networking and Communication Systems, HPCNCS-07, Orlando, Florida, USA, July 9-12 2007. ISRST 2007, ISBN 978-0-9727412-5-5 [contents] - 2006
- [j4]Mingzhen Wei, Andrew H. Sung, Martha E. Cather:
Improving database quality through eliminating duplicate records. Data Sci. J. 5: 127-142 (2006) - [j3]Tao Xie, Xiao Qin, Andrew H. Sung, Man Lin, Laurence Tianruo Yang:
Real-time scheduling with quality of security constraints. Int. J. High Perform. Comput. Netw. 4(3/4): 188-197 (2006) - [c45]Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung:
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). AINA (2) 2006: 10-14 - [c44]Srinivas Mukkamala, Qingzhong Liu, Rajeev Veeraghattam, Andrew H. Sung:
Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. ICAISC 2006: 951-961 - [c43]Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete Ribeiro:
Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. ICPR (2) 2006: 267-270 - [c42]Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Tree Based Behavior Monitoring for Adaptive Fraud Detection. ICPR (1) 2006: 1208-1211 - [c41]Srinivas Mukkamala, Dennis Xu, Andrew H. Sung:
Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. IEA/AIE 2006: 619-628 - [c40]Qingzhong Liu, Andrew H. Sung:
Recursive Feature Addition for Gene Selection. IJCNN 2006: 1360-1367 - [c39]Ashwin Tamilarasan, Srinivas Mukkamala, Andrew H. Sung, Krishna Yendrapalli:
Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. IJCNN 2006: 4754-4761 - [c38]Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Jianzhong Liu, Zhongxue Chen:
Microarray Gene Expression Classification Based on Supervised Learning and Similarity Measures. SMC 2006: 5094-5099 - 2005
- [j2]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham:
Intrusion detection using an ensemble of intelligent paradigms. J. Netw. Comput. Appl. 28(2): 167-182 (2005) - [c37]Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Online Fraud Detection System Based on Non-Stationery Anomaly Detection. Security and Management 2005: 364-370 - [c36]Mingzhen Wei, Andrew H. Sung, Martha E. Cather:
A New Domain-Independent Field Matching Algorithm for Large Databases. DMIN 2005: 126-131 - [c35]Andrew H. Sung, Xiao Qin, Tao Xie:
Integrating Security Requirements into Scheduling for Real-Time Applications in Grid Computing. GCA 2005: 24-30 - [c34]Tao Xie, Xiao Qin, Andrew H. Sung:
SAREC: A Security-Aware Scheduling Strategy for Real-Time Applications on Clusters. ICPP 2005: 5-12 - [c33]Jianyun Xu, Andrew H. Sung, Qingzhong Liu, Srinivas Mukkamala:
Fraud Detection System Based on Behavior Mining and Anomaly Detection. IICAI 2005: 3487-3501 - [c32]Tao Xie, Andrew H. Sung, Xiao Qin:
Dynamic Task Scheduling with Security Awareness in Real-Time Systems. IPDPS 2005 - [c31]Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung:
Disassembled code analyzer for malware (DCAM). IRI 2005: 398-403 - 2004
- [c30]Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala:
Static Analyzer of Vicious Executables (SAVE). ACSAC 2004: 326-334 - [c29]Andrew H. Sung, Srinivas Mukkamala:
The Feature Selection and Intrusion Detection Problems. ASIAN 2004: 468-482 - [c28]Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Detecting Hidden Information in the Wavelet Domain. CISST 2004: 571-577 - [c27]Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala:
Polymorphic Malicious Executable Scanner by API Sequence Analysis. HIS 2004: 378-383 - [c26]Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung:
Website Visitor Classification Using Machine Learning. HIS 2004: 384-389 - [c25]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos:
Intrusion Detection Systems Using Adaptive Regression Splines. ICEIS (3) 2004: 26-33 - [c24]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos:
Intrusion Detection Systems Using Adaptive Regression Spines. ICEIS (Selected Papers) 2004: 211-218 - [c23]Srinivas Mukkamala, Andrew H. Sung:
Computational Intelligent Techniques for Detecting Denial of Service Attacks. IEA/AIE 2004: 616-624 - [c22]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham:
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. IEA/AIE 2004: 633-642 - [c21]Mingzhen Wei, Andrew H. Sung, Martha E. Cather:
Detecting Spatial Outliers Using Bipartite Outlier Detection Methods. IKE 2004: 236-244 - [c20]Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala:
Defeating the Current Steganalysis Techniques (Robust Steganography). ITCC (1) 2004: 440-444 - [c19]Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu:
JPEG Compression Immune Steganography Using Wavelet Transform. ITCC (2) 2004: 704-708 - [c18]Srinivas Mukkamala, Andrew H. Sung:
A framework for countering denial of service attacks. SMC (4) 2004: 3273-3278 - [i1]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos:
Intrusion Detection Systems Using Adaptive Regression Splines. CoRR cs.AI/0405016 (2004) - 2003
- [j1]Srinivas Mukkamala, Andrew H. Sung:
Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques. Int. J. Digit. EVid. 1(4) (2003) - [c17]Srinivas Mukkamala, Andrew H. Sung:
Detecting denial of service attacks using support vector machines. FUZZ-IEEE 2003: 1231-1236 - [c16]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham:
Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes. HIS 2003: 779-788 - [c15]Srinivas Mukkamala, Andrew H. Sung:
A Comparative Study of Techniques for Intrusion Detection. ICTAI 2003: 570- - [c14]Srinivas Mukkamala, Andrew H. Sung:
A Distributed Agent Based IDS for Stealthy Probe Detection. IICAI 2003: 413-422 - [c13]Andrew H. Sung, Srinivas Mukkamala:
Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. SAINT 2003: 209-217 - [c12]Srinivas Mukkamala, Andrew H. Sung:
Artificial intelligent techniques for intrusion detection. SMC 2003: 1266-1271 - 2002
- [c11]Andrew H. Sung:
Role of Soft Computing in Internet Security. HIS 2002: 8 - [c10]Srinivas Mukkamala, Andrew H. Sung:
Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. HIS 2002: 351-364 - 2001
- [c9]Srinivas Mukkamala, Guadalupe I. Janoski, Andrew H. Sung:
Monitoring System Security Using Neural Networks and Support Vector Machines. HIS 2001: 121-137 - [c8]Guadalupe I. Janoski, Andrew H. Sung:
Alternate Methods in Reservoir Simulation. International Conference on Computational Science (2) 2001: 253-262 - [c7]Guadalupe I. Janoski, Andrew H. Sung:
Economical large scale simulation. SMC 2001: 3211-3216 - 2000
- [c6]Hujun Li, Fangsheng Li, Andrew H. Sung, William W. Weiss:
A Fuzzy Inference Algorithm for Lithology Analysis in Formation Evaluation. IEA/AIE 2000: 290-295 - [c5]Guadalupe I. Janoski, Fansheng Li, Mateusz Pietrzyk, Andrew H. Sung, Shih-Hsien Chang, Reid B. Grigg:
Advances Reservoir Simulation Using Soft Computing. IEA/AIE 2000: 623-628
1990 – 1999
- 1998
- [c4]H. J. Li, Andrew H. Sung, William W. Weiss, S. C. Wo:
Neural networks as an aid to iterative optimization methods. SMC 1998: 1812-1817 - 1994
- [c3]Willie Chang, Hamdy S. Soliman, Andrew H. Sung:
Fingerprint Image Compression by a Natural Clustering Neural Network. ICIP (2) 1994: 341-345 - [c2]Willie Chang, Hamdy S. Soliman, Andrew H. Sung:
Fingerprint Image Compression by a Clustering Learning Network. IEA/AIE 1994: 51-56 - 1993
- [c1]Willie Chang, Hamdy S. Soliman, Andrew H. Sung:
Preserving visual perception by learning natural clustering. ICNN 1993: 661-666
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint