researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2007
2009
2010
2011
2012
2013
2014
2015
2016
2017
Filter by Tag
[+]
OR
AND
NOT
1
C++
Markov
Meta-Environment
Pascal
agent based modeling
analysis
data-flow
design
meta-model
meta-objects
mobile
modeling
protocol
routing
rule-based
security
social
systematic-approach
watermarking
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Bo Yang
Chaochang Chiu
Da-Yu Kao
Daniel Dajun Zeng
Daniel Zeng
Fatih Ozgul
Fei-Yue Wang
Ickjai Lee
Jau-Hwang Wang
Jianbin Ma
Joshua Zhexue Huang
Michael Chau
Mingwu Zhang
Shenghui Su
Shuwang Lü
Thanaruk Theeramunkong
Tsuyoshi Takagi
Weiping Chang
Xiaolong Zheng
Zhidong Cao
Filter by Top terms
[+]
OR
AND
NOT
1
approach
asia
data
detection
informatics
information
intelligence
mining
model
network
networks
pacific
paisi
proceedings
security
social
system
using
web
workshop
PAISI (paisi)
Editions
Publications
Viewing Publication 1 - 100 from 167
2017
The Hierarchy of Cyber War Definitions
Daniel Hughes 0002
,
Andrew M. Colarik
.
paisi 2017
:
15-33
[doi]
Differentiating the Investigation Response Process of Cyber Security Incident for LEAs
Shou-Ching Hsiao
,
Da-Yu Kao
.
paisi 2017
:
34-48
[doi]
VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance
Cheng-Ta Huang
,
De-En Sun
,
Yen-Lin Chen
,
Shiuh-Jeng Wang
.
paisi 2017
:
111-128
[doi]
The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory
Da-Yu Kao
,
Benjamaporn Kluaypa
,
Hung-Chih Lin
.
paisi 2017
:
3-14
[doi]
Link Prediction in Temporal Heterogeneous Networks
T. Jaya Lakshmi
,
S. Durga Bhavani
.
paisi 2017
:
83-98
[doi]
A Structural Based Community Similarity Algorithm and Its Application in Scientific Event Detection
XiangFeng Meng
,
Yunhai Tong
,
Xinhai Liu
,
Yiren Chen
,
Shaohua Tan
.
paisi 2017
:
67-82
[doi]
NetRating: Credit Risk Evaluation for Loan Guarantee Chain in China
XiangFeng Meng
,
Yunhai Tong
,
Xinhai Liu
,
Yiren Chen
,
Shaohua Tan
.
paisi 2017
:
99-108
[doi]
'Security Theater': On the Vulnerability of Classifiers to Exploratory Attacks
Tegjyot Singh Sethi
,
Mehmed Kantardzic
,
Joung Woo Ryu
.
paisi 2017
:
49-63
[doi]
Idology and Its Applications in Public Security and Network Security
Shenghui Su
,
Jianhua Zheng
,
Shuwang Lü
,
Zhiqiu Huang
,
Zhoujun Li
,
Zhenmin Tang
.
paisi 2017
:
129-149
[doi]
Intelligence and Security Informatics - 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings
G. Alan Wang
,
Michael Chau
,
Hsinchun Chen
, editors,
Volume 10241 of
Lecture Notes in Computer Science
,
2017.
[doi]
2016
Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical Framework
Daniel Hughes 0002
,
Andrew M. Colarik
.
paisi 2016
:
166-179
[doi]
Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements
Adnan Anwar
,
Abdun Naser Mahmood
,
Mark Pickering
.
paisi 2016
:
180-192
[doi]
Revisiting Attribute Independence Assumption in Probabilistic Unsupervised Anomaly Detection
Sunil Aryal
,
Kai Ming Ting
,
Gholamreza Haffari
.
paisi 2016
:
73-86
[doi]
Information Security in Software Engineering, Analysis of Developers Communications About Security in Social Q&A Website
Shahab Bayati
,
Marzieh Heidary
.
paisi 2016
:
193-202
[doi]
Intelligence and Security Informatics - 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings
Michael Chau
,
G. Alan Wang
,
Hsinchun Chen
, editors,
Volume 9650 of
Lecture Notes in Computer Science
, Springer,
2016.
[doi]
Differentially Private Multi-task Learning
Sunil Kumar Gupta
,
Santu Rana
,
Svetha Venkatesh
.
paisi 2016
:
101-113
[doi]
k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach
Jakub Lokoc
,
Jan Kohout
,
Premysl Cech
,
Tomás Skopal
,
Tomás Pevný
.
paisi 2016
:
131-145
[doi]
A Profile-Based Authorship Attribution Approach to Forensic Identification in Chinese Online Messages
Jianbin Ma
,
Bing Xue
,
Mengjie Zhang
.
paisi 2016
:
33-52
[doi]
A Syntactic Approach for Detecting Viral Polymorphic Malware Variants
Vijay Naidu
,
Ajit Narayanan
.
paisi 2016
:
146-165
[doi]
The Use of Reference Graphs in the Entity Resolution of Criminal Networks
David Robinson
.
paisi 2016
:
3-18
[doi]
Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-temporal Data
B. M. S. Bahar Talukder
,
Brinta Chowdhury
,
Tamanna Howlader
,
S. M. Mahbubur Rahman
.
paisi 2016
:
114-128
[doi]
Incremental Privacy-Preserving Association Rule Mining Using Negative Border
Duc H. Tran
,
Wee Keong Ng
,
Y. D. Wong
,
Vinh V. Thai
.
paisi 2016
:
87-100
[doi]
Multilevel Syntactic Parsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank
Jungang Xu
,
Hong Chen
,
Shilong Zhou
,
Ben He
.
paisi 2016
:
53-62
[doi]
Heterogeneous Information Networks Bi-clustering with Similarity Regularization
Xianchao Zhang
,
Haixin Li
,
Wenxin Liang
,
Linlin Zong
,
Xinyue Liu
.
paisi 2016
:
19-30
[doi]
Stratified Over-Sampling Bagging Method for Random Forests on Imbalanced Data
He Zhao
,
Xiaojun Chen 0004
,
Thanh Tung Nguyen
,
Joshua Zhexue Huang
,
Graham J. Williams
,
Hui Chen
.
paisi 2016
:
63-72
[doi]
2015
Media REVEALr: A Social Multimedia Monitoring and Intelligence System for Web Multimedia Verification
Katerina Andreadou
,
Symeon Papadopoulos
,
Lazaros Apostolidis
,
Anastasia Krithara
,
Yiannis Kompatsiaris
.
paisi 2015
:
1-20
[doi]
In Search of Plagiarism Behaviors: An Empirical Study of Online Reviews
Zhuolan Bao
,
Michael Chau
.
paisi 2015
:
102-112
[doi]
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings
Michael Chau
,
G. Alan Wang
,
Hsinchun Chen
, editors,
Volume 9074 of
Lecture Notes in Computer Science
, Springer,
2015.
[doi]
Geotagging Social Media Content with a Refined Language Modelling Approach
Giorgos Kordopatis-Zilos
,
Symeon Papadopoulos
,
Yiannis Kompatsiaris
.
paisi 2015
:
21-40
[doi]
GCM: A Greedy-Based Cross-Matching Algorithm for Identifying Users Across Multiple Online Social Networks
Wenxin Liang
,
Bo Meng
,
Xiaosong He
,
Xianchao Zhang
.
paisi 2015
:
51-70
[doi]
Chinese Word POS Tagging with Markov Logic
Zhihua Liao
,
Qixian Zeng
,
Qiyun Wang
.
paisi 2015
:
91-101
[doi]
Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities
Shenghui Su
,
Na Li
,
Shuwang Lü
.
paisi 2015
:
82-90
[doi]
P2P Lending Fraud Detection: A Big Data Approach
Jennifer J. Xu
,
Yong Lu
,
Michael Chau
.
paisi 2015
:
71-81
[doi]
Predicting Vehicle Recalls with User-Generated Contents: A Text Mining Approach
Xuan Zhang
,
Shuo Niu
,
Da Zhang
,
G. Alan Wang
,
Weiguo Fan
.
paisi 2015
:
41-50
[doi]
2014
A LDA Feature Grouping Method for Subspace Clustering of Text Data
Yeshou Cai
,
Xiaojun Chen
,
Patrick Xiaogang Peng
,
Joshua Zhexue Huang
.
paisi 2014
:
78-90
[doi]
Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan
Weiping Chang
,
Peifang Chung
.
paisi 2014
:
8-17
[doi]
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings
Michael Chau
,
Hsinchun Chen
,
G. Alan Wang
,
Jau-Hwang Wang
, editors,
Volume 8440 of
Lecture Notes in Computer Science
, Springer,
2014.
[doi]
Automatically Explore Inter-Discipline Technology from Chinese Patent Documents
Ming-Shien Cheng
,
PingYu Hsu
.
paisi 2014
:
65-77
[doi]
User Management in Information Security Engineering Environment ISEE
Yuichi Goto
,
Liqing Xu
,
Ning Zhang
,
Jingde Cheng
.
paisi 2014
:
18-34
[doi]
Rational Choice Observation of Malware Authors in Taiwan
Da-Yu Kao
.
paisi 2014
:
1-7
[doi]
Identify the Online Product Comments with Suspicious Chinese Content
Ping Han Lei
,
PingYu Hsu
,
Ming-Shien Cheng
.
paisi 2014
:
49-64
[doi]
Active and Personalized Services in an Information Security Engineering Cloud Based on ISO/IEC 15408
Liqing Xu
,
Yuichi Goto
,
Ahmad Iqbal Hakim Suhaimi
,
Ning Zhang
,
Jingde Cheng
.
paisi 2014
:
35-48
[doi]
2013
Detecting Web Attacks Based on Domain Statistics
Chia-Mei Chen
,
Jhe-Jhun Huang
,
Ya-Hui Ou
.
paisi 2013
:
97-106
[doi]
Label Micro-blog Topics Using the Bayesian Inference Method
Heng Gao
,
Qiudan Li
,
Xiaolong Zheng
.
paisi 2013
:
19-28
[doi]
Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks
Amrita Ghosal
,
Aadirupa Saha
,
Sipra Das Bit
.
paisi 2013
:
82-96
[doi]
Identifying Peer Influence in Online Social Networks Using Transfer Entropy
Saike He
,
Xiaolong Zheng
,
Daniel Zeng
,
Kainan Cui
,
Zhu Zhang
,
Chuan Luo
.
paisi 2013
:
47-61
[doi]
Belief Manipulation: A Formal Model of Deceit in Message Passing Systems
Aaron Hunter
.
paisi 2013
:
1-8
[doi]
Collective Intelligence for Suicide Surveillance in Web Forums
Tim M. H. Li
,
Ben C. M. Ng
,
Michael Chau
,
Paul W. C. Wong
,
Paul S. F. Yip
.
paisi 2013
:
29-37
[doi]
Modeling Relationship Strength for Link Prediction
Ning Li
,
Xu Feng
,
Shufan Ji
,
Ke Xu
.
paisi 2013
:
62-74
[doi]
Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams
Viliam Lisý
,
Radek PÃbil
.
paisi 2013
:
38-46
[doi]
Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations
Rong Tan
,
Junzhong Gu
,
Peng Chen 0005
,
Zhou Zhong
.
paisi 2013
:
9-18
[doi]
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings
G. Alan Wang
,
Xiaolong Zheng
,
Michael Chau
,
Hsinchun Chen
, editors,
Volume 8039 of
Lecture Notes in Computer Science
, Springer,
2013.
[doi]
What Is the Uniqueness of Growth Pattern in Human Flesh Search Organization?
Tao Wang
,
Qingpeng Zhang
,
Julei Fu
,
Xiao Wang
,
Suncong Zheng
.
paisi 2013
:
75-81
[doi]
A Novel Key Scheme Based on QR Decomposition for Wireless Sensor Networks
Weimin Xie
,
Liejun Wang
,
Mingwei Wang
.
paisi 2013
:
107-115
[doi]
2012
A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining
Dan Bogdanov
,
Roman Jagomägis
,
Sven Laur
.
paisi 2012
:
112-126
[doi]
CybercrimeIR - A Technological Perspective to Fight Cybercrime
Weiping Chang
,
Yungchang Ku
,
Sinru Wu
,
Chaochang Chiu
.
paisi 2012
:
36-44
[doi]
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings
Michael Chau
,
G. Alan Wang
,
Wei Thoo Yue
,
Hsinchun Chen
, editors,
Volume 7299 of
Lecture Notes in Computer Science
, Springer,
2012.
[doi]
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor
Zhenhua Chen
,
Chunying Wu
,
Daoshun Wang
,
Shundong Li
.
paisi 2012
:
176-189
[doi]
Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining
Mustafa Amir Faisal
,
Zeyar Aung
,
John R. Williams
,
Abel Sanchez
.
paisi 2012
:
96-111
[doi]
Process Mining and Security: Visualization in Database Intrusion Detection
Viet H. Huynh
,
An N. T. Le
.
paisi 2012
:
81-95
[doi]
A Plagiarism Detection System for Arabic Text-Based Documents
Ameera Jadalla
,
Ashraf Elnagar
.
paisi 2012
:
145-153
[doi]
SaaS-Driven Botnets
Biao Jiang
,
Eul-Gyu Im
,
Yunmo Koo
.
paisi 2012
:
198-206
[doi]
A Hybrid System for Online Detection of Emotional Distress
Tim M. H. Li
,
Michael Chau
,
Paul W. C. Wong
,
Paul S. F. Yip
.
paisi 2012
:
73-80
[doi]
Multi-Layer Network for Influence Propagation over Microblog
Chao Li
,
Jun Luo
,
Joshua Zhexue Huang
,
Jianping Fan
.
paisi 2012
:
60-72
[doi]
Chinese Organization Name Recognition Based on Multiple Features
Yajuan Ling
,
Jing Yang 0001
,
Liang He
.
paisi 2012
:
136-144
[doi]
Examining Text Categorization Methods for Incidents Analysis
Nurfadhlina Mohd Sharef
,
Khairul Azhar Kasmiran
.
paisi 2012
:
154-161
[doi]
Multi-Committer Threshold Commitment Scheme from Lattice
Weiwei Sun
,
Bo Yang 0003
,
Qiong Huang
,
Sha Ma
,
XiMing Li
.
paisi 2012
:
162-175
[doi]
Cloud-Centric Assured Information Sharing
Bhavani M. Thuraisingham
,
Vaibhav Khadilkar
,
Jyothsna Rachapalli
,
Tyrone Cadenhead
,
Murat Kantarcioglu
,
Kevin W. Hamlen
,
Latifur Khan
,
Mohammad Farhan Husain
.
paisi 2012
:
1-26
[doi]
Identifying Walk Cycles for Human Recognition
Jakub Valcik
,
Jan Sedmidubský
,
Michal Balazia
,
Pavel Zezula
.
paisi 2012
:
127-135
[doi]
Information Credibility on Twitter in Emergency Situation
Xin Xia
,
Xiaohu Yang
,
Chao Wu
,
Shanping Li
,
Linfeng Bao
.
paisi 2012
:
45-59
[doi]
A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes
Jia Yu
,
Shuguang Wang
,
Huawei Zhao
,
Minglei Shu
,
Jia-liang Lv
,
Qiang Guo
.
paisi 2012
:
190-197
[doi]
Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region
Zahri Yunos
,
Rabiah Ahmad
,
Syahrir Mat Ali
,
Solahuddin Shamsuddin
.
paisi 2012
:
27-35
[doi]
2011
Spatio-temporal Similarity of Web User Session Trajectories and Applications in Dark Web Research
Sajimon Abraham
,
P. Sojan Lal
.
paisi 2011
:
1-14
[doi]
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings
Michael Chau
,
G. Alan Wang
,
Xiaolong Zheng
,
Hsinchun Chen
,
Daniel Zeng
,
Wenji Mao
, editors,
Volume 6749 of
Lecture Notes in Computer Science
, Springer,
2011.
[doi]
Estimating Collective Belief in Fixed Odds Betting
Weiyun Chen
,
Xin Li
,
Daniel Zeng
.
paisi 2011
:
54-63
[doi]
A Geospatial Analysis on the Potential Value of News Comments in Infectious Disease Surveillance
Kainan Cui
,
Zhidong Cao
,
Xiaolong Zheng
,
Daniel Zeng
,
Ke Zeng
,
Min Zheng
.
paisi 2011
:
85-93
[doi]
Modeling and Simulation for the Spread of H1N1 Influenza in School Using Artificial Societies
Wei Duan
,
Zhidong Cao
,
Yuan-Zheng Ge
,
Xiao-Gang Qiu
.
paisi 2011
:
121-129
[doi]
An Online Real-Time System to Detect Risk for Infectious Diseases and Provide Early Alert
Liang Fang
,
Zhidong Cao
.
paisi 2011
:
101-107
[doi]
Topic-Oriented Information Detection and Scoring
Saike He
,
Xiaolong Zheng
,
Changli Zhang
,
Lei Wang
.
paisi 2011
:
36-42
[doi]
Social Network Analysis Based on Authorship Identification for Cybercrime Investigation
Jianbin Ma
,
Guifa Teng
,
Shuhui Chang
,
Xiaoru Zhang
,
Ke Xiao
.
paisi 2011
:
27-35
[doi]
Specific Similarity Measure for Terrorist Networks: How Much Similar Are Terrorist Networks of Turkey?
Fatih Ozgul
,
Ahmet Çelik
,
Claus Atzenbeck
,
Zeki Erdem
.
paisi 2011
:
15-26
[doi]
Agent-Based Modeling of Netizen Groups in Chinese Internet Events
Zhangwen Tan
,
Xiaochen Li
,
Wenji Mao
.
paisi 2011
:
43-53
[doi]
Using Spatial Prediction Model to Analyze Driving Forces of the Beijing 2008 HFMD Epidemic
Jiaojiao Wang
,
Zhidong Cao
,
Quanyi Wang
,
Xiaoli Wang
,
Hongbin Song
.
paisi 2011
:
94-100
[doi]
The Impact of Community Structure of Social Contact Network on Epidemic Outbreak and Effectiveness of Non-pharmaceutical Interventions
Youzhong Wang
,
Daniel Zeng
,
Zhidong Cao
,
Yong Wang
,
Hongbin Song
,
Xiaolong Zheng
.
paisi 2011
:
108-120
[doi]
Two Protocols for Member Revocation in Secret Sharing Schemes
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
.
paisi 2011
:
64-70
[doi]
Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks
Mingwu Zhang
,
Tsuyoshi Takagi
,
Bo Yang
.
paisi 2011
:
71-84
[doi]
2010
Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security
Sajimon Abraham
,
Paulose Sojan Lal
.
paisi 2010
:
31-43
[doi]
JPEG Steganalysis Using HBCL Statistics and FR Index
Veena H. Bhat
,
Krishna S.
,
P. Deepa Shenoy
,
K. R. Venugopal
,
Lalit M. Patnaik
.
paisi 2010
:
105-112
[doi]
MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches
Imen Brahmi
,
Sadok Ben Yahia
,
Pascal Poncelet
.
paisi 2010
:
73-76
[doi]
Design and Deployment of a National Detecting Stolen Vehicles Network System
Weiping Chang
,
Chingwei Su
.
paisi 2010
:
22-27
[doi]
Fighting Cybercrime: A KM Perspective
Weiping Chang
.
paisi 2010
:
28-30
[doi]
An Emergent Traffic Messaging Service Using Wireless Technology
Patrick S. Chen
,
Yong-Kuei Liu
,
Chia-Shih Hsu
.
paisi 2010
:
44-51
[doi]
Text Mining Technique for Chinese Written Judgment of Criminal Case
Shihchieh Chou
,
Tai-Ping Hsing
.
paisi 2010
:
113-125
[doi]
Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure
Nichnan Kittiphattanabawon
,
Thanaruk Theeramunkong
,
Ekawit Nantajeewarawat
.
paisi 2010
:
126-139
[doi]
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection
Vakul Mohanty
,
Dhaval Moliya
,
Chittaranjan Hota
,
Muttukrishnan Rajarajan
.
paisi 2010
:
65-72
[doi]
Combined Detection Model for Criminal Network Detection
Fatih Ozgul
,
Zeki Erdem
,
Chris Bowerman
,
Julian Bondy
.
paisi 2010
:
1-14
[doi]
Key Independent Decryption of Graphically Encrypted Images
Ram Ratan
.
paisi 2010
:
88-97
[doi]
A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration
Binu Thomas
,
G. Raju
.
paisi 2010
:
167-172
[doi]
Efficient Privacy Preserving K-Means Clustering
Maneesh Upmanyu
,
Anoop M. Namboodiri
,
Kannan Srinathan
,
C. V. Jawahar
.
paisi 2010
:
154-166
[doi]
An Association Model for Implicit Crime Link Analysis
Jau-Hwang Wang
,
Chien-Lung Lin
.
paisi 2010
:
15-21
[doi]
Sign in
or
sign up
to see more results.